R3alM0m1X82 / SpecterBrokerView external linksLinks
Advanced Windows authentication token extraction and decryption tool for red team operations and security research
☆83Dec 30, 2025Updated last month
Alternatives and similar repositories for SpecterBroker
Users that are interested in SpecterBroker are comparing it to the libraries listed below
Sorting:
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆41Dec 30, 2025Updated last month
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆42Apr 6, 2025Updated 10 months ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆63Dec 15, 2025Updated 2 months ago
- A TUI for Active Directory collection.☆67Feb 3, 2026Updated last week
- A chrome extension that shows the time but steals the cookies in the back for demonstration purposes.☆23Mar 10, 2025Updated 11 months ago
- Arsenal of modules to beacon postex☆93Updated this week
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- A Crystal Palace shared library to resolve & perform syscalls☆56Oct 29, 2025Updated 3 months ago
- 在线安软识别☆12Aug 6, 2025Updated 6 months ago
- ☆17Jun 16, 2025Updated 8 months ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 2 months ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated 11 months ago
- ☆100Dec 11, 2025Updated 2 months ago
- arm64 linux position-independent shellcode framework☆29Dec 12, 2025Updated 2 months ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆16Jul 23, 2025Updated 6 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- Misery Loader to bypass modern EDR solutions☆17Dec 20, 2024Updated last year
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆102Jan 29, 2026Updated 2 weeks ago
- A simple program to automate Microsoft OAuth device code phishing attacks.☆19Feb 15, 2024Updated 2 years ago
- Just another repository for malware development☆13May 12, 2024Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated 11 months ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆32Oct 3, 2025Updated 4 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 6 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆97Dec 23, 2025Updated last month
- ☆50Jun 4, 2025Updated 8 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆433Nov 3, 2025Updated 3 months ago
- Microsoft Network Service Fingerprinting Tool☆67Jan 2, 2026Updated last month
- Linux Process Injection via Seccomp Notifier☆81Dec 9, 2025Updated 2 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16May 27, 2019Updated 6 years ago
- Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty☆86Feb 1, 2026Updated 2 weeks ago
- A PowerShell console in C/C++ with all the security features disabled☆342Oct 14, 2025Updated 4 months ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 5 months ago
- ☆18Oct 8, 2024Updated last year
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 7 months ago
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆92Jan 26, 2026Updated 2 weeks ago