Reflective PE loader written in Zig. Loads and executes native and .NET PE files directly from memory.
☆18Mar 2, 2026Updated 2 weeks ago
Alternatives and similar repositories for zig-pe
Users that are interested in zig-pe are comparing it to the libraries listed below
Sorting:
- Notion C2 Profile for Mythic☆35Mar 3, 2026Updated 2 weeks ago
- ☆20Sep 6, 2025Updated 6 months ago
- Revamped: Hugo+LoveIt☆10Mar 14, 2026Updated last week
- ☆18May 6, 2025Updated 10 months ago
- ☆15Oct 21, 2021Updated 4 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- ASPX Web Shell with COFF Loader☆122Mar 10, 2026Updated last week
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.☆76Feb 25, 2026Updated 3 weeks ago
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆53Mar 16, 2026Updated last week
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated 10 months ago
- ☆76Jan 1, 2026Updated 2 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆27Feb 4, 2026Updated last month
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆148May 6, 2023Updated 2 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆19Updated this week
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- The 2013 edition of the Source SDK☆10Aug 19, 2017Updated 8 years ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆67Dec 15, 2025Updated 3 months ago
- ☆13Oct 21, 2023Updated 2 years ago
- MySQL Injection Exfoliation Optimization☆24Sep 15, 2019Updated 6 years ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆125Aug 19, 2025Updated 7 months ago
- Awesome MalDev Links☆52Updated this week
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- A simple server to act as a Veeam "honeypot" providing alerting for network scans for Veeam services☆15Aug 31, 2025Updated 6 months ago
- This cheatsheet maps common impacket workflows to their modern alternatives☆56Mar 16, 2026Updated last week
- Half-Life 2 Deathmatch Bug fixes (HL2DM Bug fixes)☆10Nov 17, 2024Updated last year
- Independent ReactOS Notepad☆19May 18, 2024Updated last year
- sideloading PoC using onedrive.exe & version.dll☆93Oct 30, 2025Updated 4 months ago
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆59Feb 23, 2026Updated last month
- ☆11Jun 18, 2022Updated 3 years ago
- Beautiful manager of processes, apps and terminal for Android☆14May 2, 2019Updated 6 years ago
- This is an implementation of the a-star algorithm for three-dimensional world pathfinding Using Unity .☆18Oct 15, 2017Updated 8 years ago
- Zombie Panic! (Half-Life Modification) using BFHL as a base.☆19Updated this week
- Tests the LuaJIT in GO using a number of libraries☆43Jan 14, 2017Updated 9 years ago