This is my starred repositories including the description for each tool. Makes search/filter over them easier.
☆62Feb 26, 2025Updated last year
Alternatives and similar repositories for My-starred-Repositories
Users that are interested in My-starred-Repositories are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Filesystem interaction via firebeam virtual machine execution☆52Mar 26, 2026Updated 3 weeks ago
- ☆34Mar 19, 2025Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆384Oct 14, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆53Jun 28, 2025Updated 9 months ago
- A Mythic agent for Windows written in C☆160Apr 9, 2026Updated last week
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 10 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- ☆146Nov 6, 2025Updated 5 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- ☆52Mar 30, 2026Updated 3 weeks ago
- Collect Windows telemetry for Maldev☆469Jan 30, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆347Oct 7, 2024Updated last year
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 4 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆25Aug 2, 2025Updated 8 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- ☆54May 31, 2025Updated 10 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆207Aug 12, 2024Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆68Jan 5, 2026Updated 3 months ago
- ☆31Aug 13, 2025Updated 8 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- ☆138Jan 16, 2025Updated last year
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Utilities for obfuscating shellcode☆102Mar 24, 2026Updated 3 weeks ago
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated last year
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆87Oct 18, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- RunPE implementation with multiple evasive techniques (2)☆280Sep 25, 2025Updated 6 months ago
- A collection of PoCs to do common things in unconventional ways☆121Aug 31, 2025Updated 7 months ago
- Mentally ill EtwTi parser☆69Jan 11, 2026Updated 3 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆279Jun 15, 2024Updated last year
- converts sRDI compatible dlls to shellcode☆36Jan 20, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 9 months ago