A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.
☆31Jun 11, 2023Updated 2 years ago
Alternatives and similar repositories for Build-Your-Own-LOLBins
Users that are interested in Build-Your-Own-LOLBins are comparing it to the libraries listed below
Sorting:
- ☆10Oct 25, 2017Updated 8 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- ☆31Feb 27, 2026Updated last week
- various python scripts☆16Jun 15, 2021Updated 4 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 7 months ago
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆321Feb 1, 2026Updated last month
- Fuzzle: Making a Puzzle for Fuzzers (ASE'22)☆44Mar 3, 2024Updated 2 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated last month
- ☆48Nov 26, 2025Updated 3 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆116Oct 30, 2025Updated 4 months ago
- Red teaming cheatsheet for Windows Active Directory environments, featuring a meticulously curated cheatsheet that transcends traditional…☆12Feb 5, 2025Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- Repository for public site hosting graph permissions☆34Updated this week
- Ghidra data type archive for Windows driver analysis☆30Oct 10, 2024Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆394Oct 6, 2024Updated last year
- ☆29Dec 11, 2025Updated 2 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆144Feb 2, 2026Updated last month
- Living Off the Foreign Land setup scripts☆74Feb 26, 2025Updated last year
- Active Directory certificate abuse☆43Oct 9, 2022Updated 3 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- Find leaked API keys in websites☆39May 5, 2025Updated 10 months ago
- Interactive results explorer and annotation tool for Nosey Parker☆55Jun 28, 2025Updated 8 months ago
- Репозиторий, содержащий решения тасков и описание инцидента - RedShift190☆10Dec 26, 2023Updated 2 years ago
- ☆12Feb 4, 2025Updated last year
- Execute commands in other Sessions☆91Jul 29, 2024Updated last year
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Updated this week
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆57Nov 16, 2023Updated 2 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆242Jan 4, 2023Updated 3 years ago
- A C# Solution Source Obfuscator for avoiding AV signatures with minimal user interaction. Powered by the Roslyn C# library.☆99Mar 25, 2025Updated 11 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Jul 18, 2024Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago