SaadAhla / Anti-SandboxView external linksLinks
☆48Nov 26, 2025Updated 2 months ago
Alternatives and similar repositories for Anti-Sandbox
Users that are interested in Anti-Sandbox are comparing it to the libraries listed below
Sorting:
- Minimalistic HTTP(S) client for the NT kernel☆61Dec 1, 2025Updated 2 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆113Dec 21, 2025Updated last month
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Jan 5, 2026Updated last month
- ☆14Nov 8, 2024Updated last year
- doesnt work and wont work on it anymore☆10Jul 8, 2024Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 7 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆55Jan 17, 2026Updated 3 weeks ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 2 months ago
- A different approach to writing BOFs in rust.☆18Aug 20, 2025Updated 5 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆32Nov 11, 2025Updated 3 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 2 weeks ago
- ☆16Nov 26, 2024Updated last year
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆82Feb 9, 2026Updated last week
- AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)☆208Jan 21, 2026Updated 3 weeks ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 3 months ago
- The code I write in my blog☆62Jan 29, 2026Updated 2 weeks ago
- ☆18Feb 1, 2026Updated 2 weeks ago
- Detection Engineering Tools☆20Updated this week
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Feb 17, 2024Updated last year
- NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.☆94Nov 7, 2025Updated 3 months ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆99Jan 26, 2026Updated 2 weeks ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Apr 27, 2023Updated 2 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 8 months ago
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated last month
- My-custom-sensitive-info-disclsure-nuclei-template☆30Jan 3, 2026Updated last month
- A Windows tool that converts LDIF files to BloodHound CE☆25Dec 20, 2025Updated last month
- ☆15Feb 5, 2025Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- Demonstrates why it's not safe to download random save files from the Internet☆18Dec 30, 2022Updated 3 years ago
- Rust daemon/service wrapper☆24Oct 31, 2025Updated 3 months ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- Threat Hunting queries of multiple platforms☆52Updated this week
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆48Nov 3, 2025Updated 3 months ago
- shellcode transformation tool for YARA evasion☆50Dec 17, 2025Updated last month
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year