☆48Nov 26, 2025Updated 3 months ago
Alternatives and similar repositories for Anti-Sandbox
Users that are interested in Anti-Sandbox are comparing it to the libraries listed below
Sorting:
- Minimalistic HTTP(S) client for the NT kernel☆62Dec 1, 2025Updated 3 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆116Dec 21, 2025Updated 2 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆63Jan 5, 2026Updated 2 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago
- doesnt work and wont work on it anymore☆10Jul 8, 2024Updated last year
- ☆14Nov 8, 2024Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆57Jan 17, 2026Updated last month
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆36Nov 11, 2025Updated 3 months ago
- ☆16Nov 26, 2024Updated last year
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- ☆32Updated this week
- A different approach to writing BOFs in rust.☆19Aug 20, 2025Updated 6 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆87Feb 9, 2026Updated last month
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 4 months ago
- ☆18Feb 1, 2026Updated last month
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)☆254Jan 21, 2026Updated last month
- EmbedExeLnk by x86matthew modified by d4rkiZ☆44Apr 27, 2023Updated 2 years ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆63Feb 17, 2026Updated 2 weeks ago
- My-custom-sensitive-info-disclsure-nuclei-template☆30Jan 3, 2026Updated 2 months ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 9 months ago
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated 2 months ago
- NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.☆97Nov 7, 2025Updated 4 months ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆102Jan 26, 2026Updated last month
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- Detection Engineering Tools☆25Feb 26, 2026Updated last week
- ☆15Feb 5, 2025Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆27Dec 20, 2025Updated 2 months ago
- Demonstrates why it's not safe to download random save files from the Internet☆20Dec 30, 2022Updated 3 years ago
- The code I write in my blog☆83Feb 21, 2026Updated 2 weeks ago
- Rust daemon/service wrapper☆24Oct 31, 2025Updated 4 months ago
- shellcode transformation tool for YARA evasion☆55Dec 17, 2025Updated 2 months ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Exploit systems using older WinRAR without knowing their username (unlike other projects)☆35Aug 17, 2025Updated 6 months ago