Advanced Windows authentication token extraction and decryption tool for red team operations and security research
☆93Dec 30, 2025Updated 3 months ago
Alternatives and similar repositories for SpecterBroker
Users that are interested in SpecterBroker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆46Dec 30, 2025Updated 3 months ago
- Arsenal of modules to beacon postex☆98Mar 13, 2026Updated 2 weeks ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 11 months ago
- A chrome extension that shows the time but steals the cookies in the back for demonstration purposes.☆23Mar 10, 2025Updated last year
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆123Jan 29, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 3 months ago
- ☆49Dec 21, 2025Updated 3 months ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- ☆15May 30, 2025Updated 10 months ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 3 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure…☆30Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆48Dec 5, 2025Updated 3 months ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 6 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆119Oct 6, 2025Updated 5 months ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 3 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆33Oct 3, 2025Updated 5 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 6 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 3 months ago
- ☆17Jun 16, 2025Updated 9 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A Crystal Palace shared library to resolve & perform syscalls☆59Oct 29, 2025Updated 5 months ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆211Dec 17, 2025Updated 3 months ago
- A stager and implant that executes remote Web Assembly☆63Feb 4, 2026Updated last month
- AppLocker-Based EDR Neutralization☆327Dec 19, 2025Updated 3 months ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆207Mar 6, 2025Updated last year
- A cross platform library to write offensive and defensive security tools in Go☆131Dec 28, 2025Updated 3 months ago
- This is the tool to dump the LSASS process on modern Windows 11☆565Nov 1, 2025Updated 4 months ago
- Filesystem interaction via firebeam virtual machine execution☆44Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆62Feb 12, 2026Updated last month
- ☆50Jun 4, 2025Updated 9 months ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- IronPE is a Windows PE manual loader written in Rust for both x86 and x64 PE files.☆107Mar 10, 2026Updated 3 weeks ago
- Pentesting post exploitation tool for slack☆33Nov 15, 2025Updated 4 months ago
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆339Mar 21, 2026Updated last week