☆92Jan 19, 2026Updated last month
Alternatives and similar repositories for patchdiff-ai
Users that are interested in patchdiff-ai are comparing it to the libraries listed below
Sorting:
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆38Updated this week
- Windows 7/2008 R2 EoP☆13Feb 12, 2021Updated 5 years ago
- Code Analysis and Semantic Retrieval Library with Smart Strategies☆33Updated this week
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- The code I write in my blog☆80Feb 21, 2026Updated last week
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Accelerated execution for fast Windows fuzzing☆25Jan 9, 2025Updated last year
- ☆16Mar 26, 2024Updated last year
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- Windows KASLR bypass using prefetch side-channel☆177Apr 26, 2024Updated last year
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- ☆29Dec 29, 2022Updated 3 years ago
- ☆27Feb 13, 2026Updated 2 weeks ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Jul 23, 2023Updated 2 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆143Nov 3, 2025Updated 3 months ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- 各端、平台快速消息通知程序,支持配置文件形式或API调用☆32Oct 22, 2024Updated last year
- ☆37Feb 11, 2023Updated 3 years ago
- ☆63Apr 13, 2017Updated 8 years ago
- ☆47Dec 5, 2025Updated 2 months ago
- ☆40Apr 23, 2025Updated 10 months ago
- A exe loader that can load NScript evaluation engine of Windows Defender/Microsft Security Essential. You can fuzz NScript by using this.…☆28Oct 18, 2017Updated 8 years ago
- ☆28Aug 6, 2022Updated 3 years ago
- A Visual Studio Code Extension agent for Mythic C2☆71Nov 5, 2024Updated last year
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated last month
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆130Mar 22, 2024Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆225Nov 23, 2023Updated 2 years ago
- One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html☆415Nov 10, 2024Updated last year
- proxyshell payload generate☆75Aug 14, 2021Updated 4 years ago
- A module for CME that spiders across a domain.☆35Jul 15, 2022Updated 3 years ago