Logan-Elliott / HollowGhostView external linksLinks
Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.
☆24Oct 8, 2023Updated 2 years ago
Alternatives and similar repositories for HollowGhost
Users that are interested in HollowGhost are comparing it to the libraries listed below
Sorting:
- ☆31Aug 13, 2025Updated 6 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Jul 6, 2021Updated 4 years ago
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 10 months ago
- Tool to evade Antivirus With Different Techniques☆193Aug 16, 2023Updated 2 years ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆166Jan 12, 2026Updated last month
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 7 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆35Nov 24, 2024Updated last year
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- Check Your IP Address☆10Mar 12, 2022Updated 3 years ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆73Nov 6, 2025Updated 3 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Counter-Strike 2向けのシンプルな外部チート☆15Dec 2, 2025Updated 2 months ago
- ☆10May 13, 2021Updated 4 years ago
- A decentralized autonomous organization (DAO) starter kit. This DApp allows users to propose governance actions and vote on them using a …☆21Jan 23, 2026Updated 3 weeks ago
- Cog wrapper for microsoft/OmniParser-v2☆12Feb 25, 2025Updated 11 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 2 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 2 months ago
- Fud Runpe Av Evasion / All Av Bypass☆32Feb 24, 2023Updated 2 years ago
- ☆11May 17, 2023Updated 2 years ago
- ⚠️ A powerful Python-based WiFi network scanner and Brute-Force password attacking tool for educational and authorized testing purposes. …☆23Nov 4, 2025Updated 3 months ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A rust Implementation of the SiLabs USBXpress Driver using LibUSB☆10May 1, 2021Updated 4 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated 3 weeks ago
- Config files for my GitHub profile.☆11Updated this week
- A semantic analysis tool for debugging python code☆24Jan 12, 2026Updated last month
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 3 years ago
- Collection of my CTF Writeups, mostly Indonesian CTFs☆13Jan 15, 2024Updated 2 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆75Jul 25, 2025Updated 6 months ago
- 🐙 Yusher Web Browsers☆12Nov 2, 2021Updated 4 years ago
- ☆13Mar 28, 2024Updated last year
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆24Jan 27, 2025Updated last year
- A simple python script to follow stock market papers in your portfolio☆12Jun 29, 2020Updated 5 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- ☆21May 19, 2024Updated last year
- A curated list of awesome AI tools for generating and manipulating 3D models using text, images, or AI-enhanced modeling engines.☆13Apr 19, 2025Updated 9 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆207Sep 20, 2025Updated 4 months ago