Backdooring VSCode Projects
☆128Jun 5, 2025Updated 9 months ago
Alternatives and similar repositories for VSCode-Backdoor
Users that are interested in VSCode-Backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆78Oct 27, 2025Updated 4 months ago
- ☆17Jan 9, 2025Updated last year
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆85Apr 2, 2025Updated 11 months ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- macOS dylib stager☆36Jan 22, 2025Updated last year
- ☆16Dec 7, 2025Updated 3 months ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆43Jul 17, 2025Updated 8 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14Dec 5, 2025Updated 3 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆73May 18, 2020Updated 5 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆67Jun 10, 2025Updated 9 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Dec 12, 2025Updated 3 months ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- ☆59Oct 24, 2024Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- ☆50May 12, 2021Updated 4 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- ☆52May 4, 2025Updated 10 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- A simple website to act as a store for havoc modules and extensions☆29Jan 20, 2025Updated last year
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆123Jul 19, 2025Updated 8 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- ☆50Jul 9, 2025Updated 8 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆126Sep 12, 2024Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago