Purple-team telemetry & simulation toolkit.
β114Dec 16, 2025Updated 3 months ago
Alternatives and similar repositories for magnet
Users that are interested in magnet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux post exploitation tool for info gathering and exfiltration π§π‘πβ94Nov 13, 2025Updated 5 months ago
- NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.β97Nov 7, 2025Updated 5 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driverβ32Sep 15, 2025Updated 6 months ago
- β142Sep 9, 2025Updated 7 months ago
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)β66May 31, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Impacketβ50Feb 25, 2026Updated last month
- A portable C# utility for enumerating local and remote windows sessionsβ57Jan 1, 2026Updated 3 months ago
- Recovered samples, extracted Wasm/binaries, decoded payloads & analysis scripts from the Coruna iOS/macOS exploit kit (b27.icu). 28 JS moβ¦β53Mar 9, 2026Updated last month
- β57Nov 18, 2025Updated 4 months ago
- π΄ββ οΈ Hacking Guides, Demos and Proof-of-Concepts π₯·β219Sep 4, 2025Updated 7 months ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.β17Jan 7, 2021Updated 5 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.β33Dec 31, 2025Updated 3 months ago
- β26Mar 11, 2025Updated last year
- Windows Access token manipulation tool made in C#β25Aug 24, 2025Updated 7 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- β30Oct 13, 2025Updated 6 months ago
- A different approach to writing BOFs in rust.β20Aug 20, 2025Updated 7 months ago
- This is practice VM for malware developmentβ181Nov 17, 2025Updated 4 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478β38Dec 7, 2025Updated 4 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, β¦β30Feb 15, 2026Updated last month
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.β65Nov 19, 2025Updated 4 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets β¦β162Jan 3, 2026Updated 3 months ago
- β18Jan 27, 2018Updated 8 years ago
- Your Browser-based EVTX Companionβ115Mar 2, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export supportβ68Mar 26, 2026Updated 2 weeks ago
- gRPC / gRPC-Web Pentest Practicing Labβ10Aug 29, 2023Updated 2 years ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Managementβ18Jan 24, 2024Updated 2 years ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ130Dec 2, 2023Updated 2 years ago
- Helm charts for running open source digital forensic tools in Kubernetesβ187Apr 1, 2026Updated last week
- β48Jun 6, 2025Updated 10 months ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligenβ¦β35Jan 4, 2026Updated 3 months ago
- C# API for Nidhogg rootkitβ21Apr 25, 2024Updated last year
- ConnectWise-CRUβ14Mar 11, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Linux kernel integrity monitor for detecting syscall hookingβ85Feb 16, 2026Updated last month
- Bypass WiFi client isolation on Open and WPA2-PSK networksβ40Oct 14, 2025Updated 6 months ago
- A list of all Active Directory machines from HackTheBoxβ236Apr 5, 2026Updated last week
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants β¦β57Jun 30, 2025Updated 9 months ago
- A scanner for the FortiNet vulnerability CVE-2025-64446β30Nov 18, 2025Updated 4 months ago
- The Azure Execution Toolβ154Feb 6, 2026Updated 2 months ago
- Python tool to resolve all strings in Go binaries obfuscated by garbleβ191Feb 21, 2025Updated last year