Generate malware with AI
☆220Apr 14, 2026Updated 2 weeks ago
Alternatives and similar repositories for SynthAPT
Users that are interested in SynthAPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆77Apr 8, 2026Updated 3 weeks ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 9 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆104Apr 4, 2026Updated 3 weeks ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆75Jan 19, 2026Updated 3 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 5 months ago
- A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.☆146Apr 15, 2026Updated 2 weeks ago
- The Azure Execution Tool☆155Feb 6, 2026Updated 2 months ago
- AI-based implant feature☆25Apr 28, 2025Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- ☆43Feb 12, 2026Updated 2 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆62Mar 12, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆11Apr 23, 2019Updated 7 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Apr 23, 2026Updated last week
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- Obsidian Vault for my Cybersecurity learning☆10Oct 20, 2024Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆61Dec 11, 2024Updated last year
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆113Dec 28, 2025Updated 4 months ago
- ☆17Feb 14, 2025Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 8 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆127Jan 29, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- ☆16May 30, 2025Updated 11 months ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆128Dec 23, 2025Updated 4 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆144Apr 6, 2025Updated last year
- Live ETW-TI event viewer for Windows kernel threat-intelligence telemetry. Research tool for exploring the same signals commercial EDRs r…☆139Apr 15, 2026Updated 2 weeks ago
- ☆12Feb 4, 2025Updated last year
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- A Cobalt Strike BOF implementation of the SilentHarvest registry dumping technique☆173Apr 14, 2026Updated 2 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- remote process injections using pool party techniques☆71Jun 29, 2025Updated 10 months ago
- Vectored Exception Handling Squared☆30Dec 27, 2025Updated 4 months ago
- ☆34Mar 19, 2025Updated last year
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆195Updated this week
- ProxyWatch☆48Updated this week
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 7 months ago