☆39Apr 23, 2024Updated last year
Alternatives and similar repositories for Slides
Users that are interested in Slides are comparing it to the libraries listed below
Sorting:
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆25May 23, 2022Updated 3 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- Weaponising C# - Fundamentals Training Content☆70May 11, 2021Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- ☆12Oct 1, 2024Updated last year
- Cobalt Strike Beacon Object Files☆167May 2, 2022Updated 3 years ago
- ☆27Feb 3, 2026Updated 3 weeks ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- ☆94May 14, 2022Updated 3 years ago
- Enumerate Domain Data☆336Sep 13, 2023Updated 2 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆284Oct 29, 2024Updated last year
- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.☆173May 5, 2021Updated 4 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆187Jul 21, 2022Updated 3 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- ☆319Jun 28, 2023Updated 2 years ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆165Jun 29, 2023Updated 2 years ago
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- ☆84Nov 21, 2024Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- ☆18Oct 28, 2025Updated 4 months ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- Threadless Process Injection through entry point hijacking☆350Sep 10, 2024Updated last year
- Attempt at Obfuscated version of SharpCollection☆243Nov 15, 2025Updated 3 months ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- ☆84Aug 26, 2024Updated last year
- Overwrite a process's recovery callback and execute with WER☆102Apr 17, 2022Updated 3 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆114Apr 16, 2016Updated 9 years ago
- ☆18May 6, 2023Updated 2 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- UPX - the Ultimate Packer for eXecutables☆14Feb 28, 2017Updated 9 years ago