☆46Sep 24, 2025Updated 5 months ago
Alternatives and similar repositories for articles
Users that are interested in articles are comparing it to the libraries listed below
Sorting:
- Extracting NetNTLM without touching lsass.exe☆244Nov 27, 2023Updated 2 years ago
- Reverse Shell - technique is commonly used in cyber attacks☆20Mar 2, 2024Updated 2 years ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Dec 16, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- Privileger is a tool to work with Windows Privileges☆139Feb 7, 2023Updated 3 years ago
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Bypass EDR Create TaskServers☆39Dec 24, 2022Updated 3 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Some anti-sandbox codes, copy directly to strengthen your own ShellCode☆12Dec 26, 2022Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- List of some AD tools I frequently use☆56Nov 2, 2025Updated 4 months ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- 一个信息收集工具,集合目录扫描(跳过200的伪404),ip端口扫描协议识别☆11Feb 5, 2025Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Windows Thread Pool Injection Havoc Implementation☆33Mar 23, 2024Updated last year
- improved shellcode template for b1tg/rust-windows-shellcode☆29May 12, 2021Updated 4 years ago
- A community package-based python wrapper that simplifies carrying out scans, and pentests upon certain scope while performing security pe…☆11Dec 10, 2023Updated 2 years ago
- ☆21Aug 7, 2014Updated 11 years ago
- CVE-2024-23692 Exploit☆13Jun 18, 2024Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆172Nov 5, 2024Updated last year
- Some scripts to abuse kerberos using Powershell☆355Jul 27, 2023Updated 2 years ago
- AADInternals-Endpoints PowerShell module☆35Jul 2, 2025Updated 8 months ago
- ☆129Dec 4, 2023Updated 2 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated 11 months ago
- An AutoIt obfuscator, written in AutoIt☆13Jul 17, 2020Updated 5 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Oct 26, 2018Updated 7 years ago
- Hide Port In Windows☆42Oct 24, 2024Updated last year
- Bruteforces Fortinet SSL VPNs☆57Sep 19, 2023Updated 2 years ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Sep 3, 2025Updated 6 months ago
- a tiny code that performs kernel-mode read/write using CVE-2023-38817.☆18Mar 28, 2025Updated 11 months ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Mar 10, 2024Updated last year
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- ☆20May 1, 2023Updated 2 years ago