☆46Sep 24, 2025Updated 6 months ago
Alternatives and similar repositories for articles
Users that are interested in articles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Dec 16, 2023Updated 2 years ago
- Extracting NetNTLM without touching lsass.exe☆244Nov 27, 2023Updated 2 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- Privileger is a tool to work with Windows Privileges☆139Feb 7, 2023Updated 3 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆174Nov 5, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Some scripts to abuse kerberos using Powershell☆356Jul 27, 2023Updated 2 years ago
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- Windows Thread Pool Injection Havoc Implementation☆34Mar 23, 2024Updated 2 years ago
- List of some AD tools I frequently use☆57Nov 2, 2025Updated 5 months ago
- ☆21Aug 7, 2014Updated 11 years ago
- AADInternals-Endpoints PowerShell module☆35Jul 2, 2025Updated 9 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Jan 6, 2023Updated 3 years ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- Keycloak integration with OpenLDAP and MIT Kerberos☆19Mar 21, 2022Updated 4 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- ☆22May 26, 2023Updated 2 years ago
- Some anti-sandbox codes, copy directly to strengthen your own ShellCode☆12Dec 26, 2022Updated 3 years ago
- Reverse Shell - technique is commonly used in cyber attacks☆20Mar 2, 2024Updated 2 years ago
- Bypass EDR Create TaskServers☆39Dec 24, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- Hide Port In Windows☆42Oct 24, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- ☆21Mar 4, 2023Updated 3 years ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆28Nov 23, 2025Updated 4 months ago
- ☆136Dec 4, 2023Updated 2 years ago
- A compilation-time AoB pattern scanning library☆12Aug 27, 2021Updated 4 years ago
- A PowerShell console in C/C++ with all the security features disabled☆381Oct 14, 2025Updated 6 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- su18 ysoserial☆17May 4, 2023Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- ☆39Apr 8, 2020Updated 6 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆291May 27, 2024Updated last year
- ☆15Aug 1, 2023Updated 2 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Mar 6, 2019Updated 7 years ago