Advanced Windows authentication token extraction and decryption tool for red team operations and security research
☆95Apr 1, 2026Updated last month
Alternatives and similar repositories for SpecterBroker
Users that are interested in SpecterBroker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆56Apr 1, 2026Updated last month
- Arsenal of modules to beacon postex☆103Mar 13, 2026Updated 2 months ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year
- PolyEngine is an evasive PE packer designed for CTF challenges and low-level Windows security education. It focuses on bypassing EDR and …☆126Apr 29, 2026Updated 2 weeks ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆129Jan 29, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- sigreturn-oriented(SROP) based sleep obfuscation poc for Linux☆69Dec 15, 2025Updated 5 months ago
- A chrome extension that shows the time but steals the cookies in the back for demonstration purposes.☆24Mar 10, 2025Updated last year
- ☆48Dec 21, 2025Updated 4 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 9 months ago
- Misery Loader to bypass modern EDR solutions☆19Dec 20, 2024Updated last year
- A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.☆153Apr 15, 2026Updated last month
- Set of PoC to abuse Windows minifilters functionality☆83May 1, 2026Updated 2 weeks ago
- arm64 linux position-independent shellcode framework☆31Dec 12, 2025Updated 5 months ago
- Help red teams find opsec processes during engagements☆44Dec 7, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure…☆30Updated this week
- ☆50Dec 5, 2025Updated 5 months ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 8 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆120Oct 6, 2025Updated 7 months ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 5 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 10 months ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆34Oct 3, 2025Updated 7 months ago
- ☆16May 30, 2025Updated 11 months ago
- ☆17Jun 16, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Crystal Palace shared library to resolve & perform syscalls☆61Oct 29, 2025Updated 6 months ago
- Injecting code by recompiling shellcode into a ROP chain.☆137Apr 21, 2026Updated 3 weeks ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆101Dec 23, 2025Updated 4 months ago
- A practical client for ADWS in Golang.☆52Mar 3, 2026Updated 2 months ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- AppLocker-Based EDR Neutralization☆337Dec 19, 2025Updated 5 months ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆221Dec 17, 2025Updated 5 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- A cross platform library to write offensive and defensive security tools in Go☆142Apr 21, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is the tool to dump the LSASS process on modern Windows 11☆578Nov 1, 2025Updated 6 months ago
- Offensive Powershell obfuscator☆27Sep 6, 2024Updated last year
- Filesystem interaction via firebeam virtual machine execution☆52Mar 26, 2026Updated last month
- ☆50Jun 4, 2025Updated 11 months ago
- ☆62Feb 12, 2026Updated 3 months ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 7 months ago