Generate malware with AI
☆221Apr 14, 2026Updated last month
Alternatives and similar repositories for SynthAPT
Users that are interested in SynthAPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆82Apr 8, 2026Updated last month
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 10 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 4 months ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆106Apr 4, 2026Updated last month
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆77Jan 19, 2026Updated 4 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 6 months ago
- The Azure Execution Tool☆156Feb 6, 2026Updated 3 months ago
- AI-based implant feature☆25Apr 28, 2025Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆63Mar 12, 2025Updated last year
- ☆48Feb 12, 2026Updated 3 months ago
- ☆11Apr 23, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.☆153Apr 15, 2026Updated last month
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19May 13, 2026Updated last week
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆61Dec 11, 2024Updated last year
- ☆17Feb 14, 2025Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 8 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆128Dec 28, 2025Updated 4 months ago
- A nim port of C5pider's Ekko project.☆18Oct 1, 2022Updated 3 years ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆129Jan 29, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆16May 30, 2025Updated 11 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆144Apr 6, 2025Updated last year
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆129Dec 23, 2025Updated 4 months ago
- ☆13Feb 4, 2025Updated last year
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆210Dec 25, 2024Updated last year
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- remote process injections using pool party techniques☆71Jun 29, 2025Updated 10 months ago
- A Cobalt Strike BOF implementation of the SilentHarvest registry dumping technique☆177Apr 14, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Vectored Exception Handling Squared☆30Dec 27, 2025Updated 4 months ago
- ☆34Mar 19, 2025Updated last year
- Live ETW-TI event viewer for Windows kernel threat-intelligence telemetry. Research tool for exploring the same signals commercial EDRs r…☆143Apr 15, 2026Updated last month
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆204Apr 26, 2026Updated 3 weeks ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 8 months ago
- ProxyWatch☆50Apr 25, 2026Updated 3 weeks ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 6 months ago