Protection against HTML smuggling attacks.
β101Jul 10, 2025Updated 8 months ago
Alternatives and similar repositories for SmuggleShield
Users that are interested in SmuggleShield are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCSβ150Feb 10, 2025Updated last year
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 5 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, dependeβ¦β16Aug 29, 2025Updated 7 months ago
- .NET tool used to enrich RPC telemetryβ101Jan 24, 2026Updated 2 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)β195Feb 6, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β78Sep 1, 2025Updated 7 months ago
- Examine Chrome extensions for security issuesβ97Nov 16, 2025Updated 4 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails cβ¦β166Oct 9, 2024Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functionsβ269Apr 8, 2025Updated last year
- β44Jul 17, 2025Updated 8 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ15Nov 13, 2025Updated 4 months ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.β61Mar 27, 2026Updated last week
- This repository contains scripts about ACL abuse and any other active directory attacking methods.β36Aug 20, 2023Updated 2 years ago
- Kibana app for RedELKβ18Mar 19, 2023Updated 3 years ago
- NordVPN Special Discount Offer β’ AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.β49Nov 17, 2025Updated 4 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ99Apr 2, 2025Updated last year
- Situational Awareness script to identify how and where to run implantsβ68Dec 6, 2024Updated last year
- DFSCoerce exe revisited version with custom authenticationβ43Jan 13, 2024Updated 2 years ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!β542May 9, 2025Updated 11 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.β87Mar 6, 2025Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishingβ57Mar 8, 2025Updated last year
- β61Dec 13, 2025Updated 3 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloningβ139Dec 7, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- β40Aug 2, 2024Updated last year
- Windows rootkit designed to work with BYOVD exploitsβ218Jan 18, 2025Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-buiβ¦β234Feb 12, 2025Updated last year
- β44Jul 9, 2024Updated last year
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT pathsβ361Aug 11, 2024Updated last year
- β50Jul 9, 2025Updated 9 months ago
- β160Jan 27, 2025Updated last year
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via β¦β152Jan 25, 2026Updated 2 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β45Apr 21, 2025Updated 11 months ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This technique leverages PowerShell'sΒ .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typβ¦β53May 16, 2025Updated 10 months ago
- Abusing Azure services over C2β368Jan 20, 2026Updated 2 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.β166Jul 30, 2025Updated 8 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagementsβ247Mar 19, 2024Updated 2 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactionsβ348Nov 19, 2024Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ227Nov 23, 2023Updated 2 years ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotelyβ383Dec 13, 2024Updated last year