Backdooring VSCode Projects
☆129Jun 5, 2025Updated 10 months ago
Alternatives and similar repositories for VSCode-Backdoor
Users that are interested in VSCode-Backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆79Oct 27, 2025Updated 5 months ago
- ☆17Jan 9, 2025Updated last year
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated 3 weeks ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆85Apr 2, 2025Updated last year
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- macOS dylib stager☆36Jan 22, 2025Updated last year
- ☆16Dec 7, 2025Updated 4 months ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆25Jul 5, 2023Updated 2 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 6 months ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- ☆44Jul 17, 2025Updated 8 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- Stage 0☆168Dec 18, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A BOF that's a BOF Loader and more☆201Apr 6, 2026Updated last week
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆99Apr 2, 2025Updated last year
- An example of COM hijacking using a proxy DLL.☆43Aug 17, 2021Updated 4 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14Dec 5, 2025Updated 4 months ago
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 10 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆75May 18, 2020Updated 5 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆67Jun 10, 2025Updated 10 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Dec 12, 2025Updated 4 months ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- ☆60Oct 24, 2024Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆49May 12, 2021Updated 4 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- ☆52May 4, 2025Updated 11 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Run TTPs, with AI!☆125Feb 23, 2026Updated last month
- A simple website to act as a store for havoc modules and extensions☆30Jan 20, 2025Updated last year