Repository hosting the bluehammer vulnerability
☆1,036Apr 9, 2026Updated last week
Alternatives and similar repositories for BlueHammer
Users that are interested in BlueHammer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆43Feb 12, 2026Updated 2 months ago
- The Red Sun vulnerability repository☆1,345Updated this week
- InfraGuard is a Command & Control Redirection Proxy and Manager which protects your Red Team Infrastructure against threat attribution☆133Apr 6, 2026Updated last week
- Weaponizing DCOM for NTLM Authentication Coercions☆206Nov 4, 2025Updated 5 months ago
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export support☆68Mar 26, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.☆82Feb 25, 2026Updated last month
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 months ago
- Resolve offsets, gadgets and symbols from NTKernel☆60Jan 15, 2026Updated 3 months ago
- Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable AP…☆87Apr 1, 2026Updated 2 weeks ago
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated 2 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,313Mar 27, 2026Updated 3 weeks ago
- ☆59Feb 19, 2026Updated 2 months ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆484Jan 15, 2026Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Lateral movement with DCOM DLL hijacking☆175Jul 4, 2025Updated 9 months ago
- Impacket pre-compiled binaries☆19Jul 31, 2023Updated 2 years ago
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆74Mar 7, 2026Updated last month
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆28Aug 19, 2024Updated last year
- A COFF Loader written in Rust☆141Dec 1, 2025Updated 4 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,347Nov 12, 2025Updated 5 months ago
- EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.☆825Nov 1, 2025Updated 5 months ago
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 9 months ago
- Just A list Of Some Multilingual XSS Payloads and other weird ones i made☆124Sep 28, 2025Updated 6 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- AV/EDR Lab environment setup references to help in Malware development☆462Feb 19, 2025Updated last year
- Sleep Obfuscation in Rust☆281Dec 1, 2025Updated 4 months ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆34Sep 17, 2025Updated 7 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 4 months ago
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 · x64 · x86 · WoW64 · ARM64☆441Mar 7, 2026Updated last month
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆398Sep 26, 2025Updated 6 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆263Feb 21, 2025Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆82Aug 3, 2025Updated 8 months ago
- Ghosting-AMSI☆234Apr 24, 2025Updated 11 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 4 months ago
- ☆384Oct 17, 2025Updated 6 months ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆31Oct 2, 2025Updated 6 months ago
- ☆97Jan 21, 2025Updated last year