A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit
☆118Aug 9, 2024Updated last year
Alternatives and similar repositories for PolyDrop
Users that are interested in PolyDrop are comparing it to the libraries listed below
Sorting:
- ☆17Jan 9, 2025Updated last year
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 9 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆169Jan 29, 2025Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- Java archive implant toolkit.☆61Apr 20, 2025Updated 10 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Addon for BHCE☆58Apr 1, 2025Updated 10 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆95Jun 18, 2024Updated last year
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 6 months ago
- Blog/Journal on how to backdoor VSCode extensions☆76Updated this week
- ☆43Jul 17, 2025Updated 7 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- PowerShell Obfuscator☆231Aug 28, 2025Updated 5 months ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated 3 weeks ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 5 months ago
- ☆16Dec 7, 2025Updated 2 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 3 months ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆121Jul 11, 2025Updated 7 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 7 months ago
- ☆59Oct 24, 2024Updated last year
- BOF to decrypt Signal Desktop chat logs☆71Feb 20, 2025Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- ☆568Mar 28, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- A dotnet executable to get an Entra token in an authenticated runtime☆16Oct 30, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last week
- ☆21Jan 8, 2026Updated last month
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year