Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques
☆112Dec 28, 2025Updated 3 months ago
Alternatives and similar repositories for NEBULA
Users that are interested in NEBULA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- A stager and implant that executes remote Web Assembly☆63Feb 4, 2026Updated last month
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- Ludus range for the Constructing Defense Lab☆113Feb 23, 2026Updated last month
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated 2 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆152Mar 4, 2026Updated 3 weeks ago
- A PowerShell variant of the amazing patch_review.py by kevthehermit☆214Mar 4, 2026Updated 3 weeks ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆66Jan 5, 2026Updated 2 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆71Mar 8, 2026Updated 3 weeks ago
- Stage 0☆169Dec 18, 2024Updated last year
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆89Feb 9, 2026Updated last month
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆90Mar 10, 2026Updated 2 weeks ago
- Baseline a Windows System against LOLBAS☆73Feb 2, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- sideloading PoC using onedrive.exe & version.dll☆93Oct 30, 2025Updated 4 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆57Dec 4, 2025Updated 3 months ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated last month
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 3 months ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- List web account manager (WAM) accounts added to the current profile☆24Dec 11, 2025Updated 3 months ago
- A BOF that's a BOF Loader and more☆201Jan 17, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆25Feb 18, 2025Updated last year
- ☆59Dec 10, 2025Updated 3 months ago
- Visualize Microsoft Defender XDR process trees and security events☆32Aug 24, 2025Updated 7 months ago
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆265Sep 23, 2025Updated 6 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- Splunk Stuffs!☆13Oct 14, 2023Updated 2 years ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆108Jan 26, 2026Updated 2 months ago
- Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions☆64Nov 15, 2025Updated 4 months ago
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆294Nov 1, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- kerberos in rust for fun and profit☆67Mar 13, 2026Updated 2 weeks ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆159Jan 3, 2026Updated 2 months ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆37Aug 2, 2025Updated 7 months ago
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year