☆21Feb 7, 2024Updated 2 years ago
Alternatives and similar repositories for bspwm
Users that are interested in bspwm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Sep 24, 2024Updated last year
- Simple Project that Extracts PE Information.☆22Apr 4, 2025Updated last year
- ☆27Nov 24, 2024Updated last year
- TP link AC600 Drivers for All Linux distros☆24Mar 16, 2024Updated 2 years ago
- Commands and Scripts to attack Linux and Servers☆38May 1, 2025Updated 11 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆59Mar 2, 2025Updated last year
- PlanqX EDR is an open-source, advanced Endpoint Detection and Response (EDR) solution for Windows, offering real-time system and network …☆25Jun 5, 2025Updated 10 months ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- This repository contains AI-generated analysis reports produced as part of an automated N-day research pipeline targeting Microsoft compo…☆81Mar 20, 2026Updated 2 weeks ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆27Aug 28, 2025Updated 7 months ago
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆96Oct 17, 2025Updated 5 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 3 months ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆88Jun 4, 2024Updated last year
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆289Feb 21, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A reflective DLL development template for the Rust programming language☆117Nov 4, 2025Updated 5 months ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆340Updated this week
- DLL proxying for lazy people☆203Dec 1, 2025Updated 4 months ago
- Call Stack Spoofing for Rust☆212Jan 28, 2026Updated 2 months ago
- Out-of-tree LLVM passes in Rust☆233Aug 17, 2025Updated 7 months ago
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆646Oct 27, 2025Updated 5 months ago
- Inject DLLs into the explorer process using icons☆406May 18, 2025Updated 10 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆413Jan 11, 2026Updated 2 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆477Mar 15, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antiv…☆531Mar 24, 2026Updated last week
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆622Jan 2, 2025Updated last year
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,853Dec 29, 2025Updated 3 months ago
- ET is a powerful application to improve performance, debloat, optimize and enhance privacy for Windows 10/11.☆577Feb 15, 2026Updated last month
- Red Team C code repo☆569Dec 16, 2024Updated last year
- Threadless Process Injection using remote function hooking.☆808Sep 4, 2024Updated last year
- Certified Red Team Operator☆454Apr 17, 2022Updated 3 years ago
- Sleep Obfuscation☆825Dec 3, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,308Mar 27, 2026Updated last week
- Alternative Shellcode Execution Via Callbacks☆1,704Nov 11, 2022Updated 3 years ago
- ☆1,675Apr 14, 2025Updated 11 months ago
- ☆1,709Aug 19, 2022Updated 3 years ago
- Windows Event Log Killer☆1,813Sep 21, 2023Updated 2 years ago
- ☆2,173Feb 21, 2023Updated 3 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,841Sep 24, 2021Updated 4 years ago