Purple-team telemetry & simulation toolkit.
☆108Dec 16, 2025Updated 2 months ago
Alternatives and similar repositories for magnet
Users that are interested in magnet are comparing it to the libraries listed below
Sorting:
- Impacket☆49Feb 25, 2026Updated last week
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.☆96Nov 7, 2025Updated 3 months ago
- ☆55Nov 18, 2025Updated 3 months ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 3 months ago
- ☆30Oct 13, 2025Updated 4 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆93Jul 7, 2025Updated 7 months ago
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆68May 31, 2025Updated 9 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 2 months ago
- ☆26Mar 11, 2025Updated 11 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆94Nov 13, 2025Updated 3 months ago
- ☆141Sep 9, 2025Updated 5 months ago
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆25Oct 13, 2025Updated 4 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 2 weeks ago
- Gather all external facing AWS Services and run it through nmap☆13Feb 3, 2022Updated 4 years ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- ☆19Aug 4, 2021Updated 4 years ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 2 months ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆35Jan 4, 2026Updated 2 months ago
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆98Updated this week
- CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital invest…☆58Feb 21, 2026Updated last week
- This is practice VM for malware development☆180Nov 17, 2025Updated 3 months ago
- A highly flexible AI Agent-driven EVM smart contract vulnerability detection framework☆64Feb 14, 2026Updated 2 weeks ago
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆30Jul 11, 2025Updated 7 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆40Jan 3, 2026Updated 2 months ago
- Threat Hunting queries of multiple platforms☆62Updated this week
- Convert Sigma rules to SIEM queries, directly in your browser.☆111Jan 24, 2026Updated last month
- Less sugar (entropy) for your binaries☆33Sep 10, 2025Updated 5 months ago
- A tool for fetching DFIR and other GitHub tools.☆25Aug 2, 2025Updated 7 months ago
- ☆104Nov 21, 2025Updated 3 months ago
- Helm charts for running open source digital forensic tools in Kubernetes☆184Updated this week
- ☆18Jan 27, 2018Updated 8 years ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆135Feb 14, 2026Updated 2 weeks ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- collection of blogs about malware development and analysis☆65Dec 2, 2025Updated 3 months ago
- ☆24Mar 12, 2025Updated 11 months ago