Demonstrating 3 persistence layers from a single EXE, that converts itself into proxy DLLs at runtime
☆91Mar 29, 2026Updated last month
Alternatives and similar repositories for 3LayersPersistence
Users that are interested in 3LayersPersistence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆41Oct 6, 2025Updated 7 months ago
- Files related to works published in Black Mass☆11Sep 16, 2023Updated 2 years ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆124Jan 21, 2026Updated 3 months ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆25Jan 19, 2026Updated 4 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆37Apr 16, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆76May 10, 2026Updated last week
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆120Apr 22, 2026Updated 3 weeks ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 4 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 6 months ago
- A C# utility for interacting with SCOM☆100Dec 2, 2025Updated 5 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆92Feb 16, 2026Updated 3 months ago
- A practical client for ADWS in Golang.☆52Mar 3, 2026Updated 2 months ago
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆42Mar 16, 2026Updated 2 months ago
- ☆11Jul 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A TUI for Active Directory collection.☆137Mar 17, 2026Updated 2 months ago
- Impacket☆50Feb 25, 2026Updated 2 months ago
- ☆12Oct 18, 2021Updated 4 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆32Dec 20, 2025Updated 5 months ago
- A New Exploitation Technique for Visual Studio Projects☆13Nov 5, 2023Updated 2 years ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆34Oct 3, 2025Updated 7 months ago
- C implementation of the Kademlia-based Distributed Hash Table (DHT) used in the BitTorrent network (aka "mainline DHT")☆25Oct 12, 2020Updated 5 years ago
- Comprehensive Protection Against Deepfakes, Deepnudes & Harmful Content☆20Jan 3, 2026Updated 4 months ago
- dcsync bof☆52Feb 13, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Scrape GrayHat Warefare for leaked code signing certificates. Outputs certificate hashes to crack with JtR☆13Nov 25, 2023Updated 2 years ago
- ☆28Mar 6, 2026Updated 2 months ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆121Apr 9, 2026Updated last month
- A cmake template for crystal palace☆40Dec 20, 2025Updated 4 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆13Oct 31, 2023Updated 2 years ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 3 months ago
- RPC to WebClient startup☆57Aug 19, 2025Updated 9 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆44Dec 7, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆72Mar 24, 2026Updated last month
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- Awesome MalDev Links☆63Apr 28, 2026Updated 3 weeks ago
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 5 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 8 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 3 years ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆134Jan 28, 2026Updated 3 months ago