payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter
☆112Jan 12, 2024Updated 2 years ago
Alternatives and similar repositories for Checkmate
Users that are interested in Checkmate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆35Dec 6, 2023Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Linux Sleep Obfuscation☆114Jan 7, 2024Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Execute shellcode files with rundll32☆218Jan 28, 2024Updated 2 years ago
- TypeLib persistence technique☆142Oct 22, 2024Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Jan 25, 2024Updated 2 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆130Nov 12, 2023Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆63Apr 4, 2026Updated last week
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 2 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 5 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- ☆120Jan 30, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- ☆52Mar 30, 2026Updated 2 weeks ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆162Feb 22, 2024Updated 2 years ago
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆288Jan 21, 2024Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆192Mar 4, 2024Updated 2 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆264Jun 29, 2024Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆444Dec 21, 2023Updated 2 years ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆591Jun 12, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Native Syscalls Shellcode Injector☆268Jul 2, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Use hardware breakpoint to dynamically change SSN in run-time☆281Apr 10, 2024Updated 2 years ago
- ☆570Mar 28, 2024Updated 2 years ago
- Sleep obfuscation☆272Dec 13, 2024Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆442Jul 8, 2024Updated last year
- ☆235Oct 8, 2024Updated last year
- ☆142May 22, 2024Updated last year
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆59Feb 29, 2024Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago