Living Off The Land API
☆59Feb 2, 2026Updated last month
Alternatives and similar repositories for LOLAPI
Users that are interested in LOLAPI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆54Nov 3, 2025Updated 4 months ago
- A catalog of glob-based command obfuscation for Linux · macOS · Windows CMD/PowerShell☆139Mar 14, 2026Updated last week
- ☆76Jan 1, 2026Updated 2 months ago
- ☆20Sep 6, 2025Updated 6 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆80Mar 13, 2026Updated last week
- A Wayland compositor for macOS, using Cocoa as its backend.☆47Mar 18, 2026Updated last week
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated 11 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 3 months ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆27Feb 4, 2026Updated last month
- abusing windows toast notifications for fun and user manipulation☆57Updated this week
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- Chisel new generation, written in rust. SSH under WSS with some customization.☆129Jan 24, 2026Updated 2 months ago
- Reflective PE loader written in Zig. Loads and executes native and .NET PE files directly from memory.☆18Mar 2, 2026Updated 3 weeks ago
- ☆51Mar 6, 2026Updated 2 weeks ago
- a BOF implementation of various registry persistence methods☆96Nov 11, 2025Updated 4 months ago
- Awesome MalDev Links☆52Mar 18, 2026Updated last week
- ☆12Apr 13, 2023Updated 2 years ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- A simple server to act as a Veeam "honeypot" providing alerting for network scans for Veeam services☆15Aug 31, 2025Updated 6 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- This cheatsheet maps common impacket workflows to their modern alternatives☆56Mar 16, 2026Updated last week
- A security checking tool☆112Feb 4, 2026Updated last month
- Minimal AXIS2 webshell☆12Sep 7, 2014Updated 11 years ago
- Ground up implementation of OleView with improved performance, hyperlinks etc.☆12Nov 5, 2021Updated 4 years ago
- uYouPlus is a modified version of uYou (made by @MiRO92) with additional features and mainly made for jailbroken users!☆14Sep 18, 2022Updated 3 years ago
- forgive me :3☆34Jan 1, 2026Updated 2 months ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 5 months ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆29Nov 14, 2025Updated 4 months ago
- 使用Tensorflow搭建CNN实现验证码识别👺👺👺☆10Feb 21, 2019Updated 7 years ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆37Aug 2, 2025Updated 7 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆38Nov 11, 2025Updated 4 months ago
- This Repository Contains some of the solution of the task assigned during the KPMG_CTF 2023-07-28 to 2023-07-30☆19Feb 2, 2024Updated 2 years ago