Advanced Windows authentication token extraction and decryption tool for red team operations and security research
☆94Apr 1, 2026Updated 3 weeks ago
Alternatives and similar repositories for SpecterBroker
Users that are interested in SpecterBroker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆47Apr 1, 2026Updated 3 weeks ago
- Arsenal of modules to beacon postex☆102Mar 13, 2026Updated last month
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year
- A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.☆146Apr 15, 2026Updated 2 weeks ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆127Jan 29, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- sigreturn-oriented(SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 4 months ago
- A chrome extension that shows the time but steals the cookies in the back for demonstration purposes.☆24Mar 10, 2025Updated last year
- ☆48Dec 21, 2025Updated 4 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 8 months ago
- Misery Loader to bypass modern EDR solutions☆19Dec 20, 2024Updated last year
- arm64 linux position-independent shellcode framework☆31Dec 12, 2025Updated 4 months ago
- Help red teams find opsec processes during engagements☆43Dec 7, 2024Updated last year
- Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure…☆30Updated this week
- ☆50Dec 5, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 7 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆120Oct 6, 2025Updated 6 months ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 4 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 10 months ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆34Oct 3, 2025Updated 6 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 9 months ago
- ☆16May 30, 2025Updated 10 months ago
- ☆17Jun 16, 2025Updated 10 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆101Dec 23, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Crystal Palace shared library to resolve & perform syscalls☆60Oct 29, 2025Updated 6 months ago
- Injecting code by recompiling shellcode into a ROP chain.☆107Apr 21, 2026Updated last week
- A practical client for ADWS in Golang.☆50Mar 3, 2026Updated last month
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 2 months ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- AppLocker-Based EDR Neutralization☆335Dec 19, 2025Updated 4 months ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆218Dec 17, 2025Updated 4 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- A cross platform library to write offensive and defensive security tools in Go☆141Apr 21, 2026Updated last week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This is the tool to dump the LSASS process on modern Windows 11☆574Nov 1, 2025Updated 5 months ago
- Filesystem interaction via firebeam virtual machine execution☆52Mar 26, 2026Updated last month
- PolyEngine is an evasive PE packer designed for CTF challenges and low-level Windows security education. It focuses on bypassing EDR and …☆57Updated this week
- ☆50Jun 4, 2025Updated 10 months ago
- ☆62Feb 12, 2026Updated 2 months ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago