A tool to easily perform GitHub Device Code Phishing on red team engagements
☆85Feb 9, 2026Updated 3 weeks ago
Alternatives and similar repositories for GitHubDeviceCodePhishing
Users that are interested in GitHubDeviceCodePhishing are comparing it to the libraries listed below
Sorting:
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆186Jan 11, 2026Updated last month
- ☆58Dec 10, 2025Updated 2 months ago
- ☆17Oct 21, 2023Updated 2 years ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 4 months ago
- A C# tool for extracting information from SCCM PXE boot media.☆51Jan 14, 2026Updated last month
- A C# utility for interacting with SCOM☆96Dec 2, 2025Updated 3 months ago
- Proof of concept for Kerberos Armoring abuse.☆80Dec 12, 2025Updated 2 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Jan 28, 2026Updated last month
- Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions☆63Nov 15, 2025Updated 3 months ago
- ☆55Nov 18, 2025Updated 3 months ago
- ☆48Nov 26, 2025Updated 3 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- Awesome MalDev Links☆39Updated this week
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 7 months ago
- Cobalt Strike BOF☆42Dec 10, 2025Updated 2 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 8 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 8 months ago
- ☆17Jan 9, 2025Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆36Oct 1, 2025Updated 5 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆39Dec 7, 2025Updated 2 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆58Dec 15, 2025Updated 2 months ago
- ☆19Jan 31, 2025Updated last year
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- ProxyWatch☆37Feb 9, 2026Updated 3 weeks ago
- ☆33Mar 19, 2025Updated 11 months ago
- ☆47Dec 5, 2025Updated 2 months ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆70Dec 26, 2025Updated 2 months ago
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated 11 months ago
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆58Sep 7, 2024Updated last year
- Commandline spoofing on Windows☆94Nov 25, 2025Updated 3 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆280Jan 12, 2026Updated last month
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated last month
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- ☆95Jan 16, 2025Updated last year
- Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra al…☆120Updated this week