Founding is a generator that will create a loader encrypted or obfuscated with different execution types
☆133Aug 23, 2025Updated 8 months ago
Alternatives and similar repositories for Founding
Users that are interested in Founding are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆376Apr 18, 2026Updated last month
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 6 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆85Nov 15, 2025Updated 6 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- .NET tool used to enrich RPC telemetry☆102Jan 24, 2026Updated 3 months ago
- Set of PoC to abuse Windows minifilters functionality☆83May 1, 2026Updated 2 weeks ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 7 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- ☆24Sep 6, 2025Updated 8 months ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆109Sep 4, 2025Updated 8 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆192Jan 17, 2026Updated 4 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 4 months ago
- ☆50Nov 26, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated 2 years ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆58Jul 13, 2025Updated 10 months ago
- ☆14Jul 26, 2025Updated 9 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆171Sep 22, 2025Updated 7 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆16May 2, 2026Updated 2 weeks ago
- Build sneaky & malicious LNK files.☆160Jul 16, 2025Updated 10 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆42Nov 11, 2025Updated 6 months ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 4 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆47Feb 6, 2026Updated 3 months ago
- Reflective PE loader written in Zig. Loads and executes native and .NET PE files directly from memory.☆61Mar 2, 2026Updated 2 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 7 months ago
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆130Feb 25, 2026Updated 2 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 4 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆139Oct 23, 2025Updated 6 months ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆390May 12, 2026Updated last week
- Automating the MITM attack on WSUS☆363Apr 3, 2026Updated last month
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆205Mar 15, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ForsHops☆154Mar 25, 2025Updated last year
- ☆61Oct 24, 2025Updated 6 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆93Jan 14, 2026Updated 4 months ago
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆201Apr 26, 2026Updated 3 weeks ago
- Driver Buddy Revolutions for Ghidra☆47Mar 28, 2026Updated last month
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆222Mar 7, 2026Updated 2 months ago
- ☆82Apr 8, 2026Updated last month