Command Augmentation support for BOFs and .NET assemblies across agents
☆42Mar 17, 2026Updated 3 weeks ago
Alternatives and similar repositories for forge
Users that are interested in forge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Community Eventing and Scripting examples☆19Aug 11, 2025Updated 8 months ago
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆39Jan 7, 2025Updated last year
- ☆160Apr 17, 2024Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 9 months ago
- ☆37Mar 18, 2026Updated 3 weeks ago
- A python library to create BloodHound OpenGraphs☆57Feb 4, 2026Updated 2 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆139Dec 7, 2025Updated 4 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆378Mar 31, 2026Updated last week
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆128Jan 17, 2026Updated 2 months ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 8 months ago
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆300Mar 28, 2026Updated 2 weeks ago
- ☆41Oct 8, 2024Updated last year
- A Payload Analysis Framework☆118Oct 9, 2025Updated 6 months ago
- ☆157Dec 14, 2023Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 4 months ago
- Mythic Scripting PyPi package - mythic☆29Oct 10, 2025Updated 6 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Beacon Object File (BOF) is a compiled C program, written to a convention that allows it to execute within a Beacon process and use int…☆262Nov 24, 2025Updated 4 months ago
- CLI tool to interact with the BloodHound CE API☆70Mar 6, 2026Updated last month
- A standalone tool for logging shell commands to GhostWriter automatically☆18Aug 24, 2024Updated last year
- A collection of position independent coding resources☆111Nov 15, 2025Updated 4 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- ForsHops☆59Mar 25, 2025Updated last year
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Situational Awareness commands implemented using Beacon Object Files☆21Mar 21, 2026Updated 3 weeks ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- A COFF Loader written in Rust☆140Dec 1, 2025Updated 4 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- TypeLib persistence technique☆142Oct 22, 2024Updated last year
- Linker for Beacon Object Files☆175Mar 30, 2026Updated last week
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year