A New Exploitation Technique for Visual Studio Projects
☆11Nov 5, 2023Updated 2 years ago
Alternatives and similar repositories for VisualStudio-RCE-EvilSln
Users that are interested in VisualStudio-RCE-EvilSln are comparing it to the libraries listed below
Sorting:
- Rainbow table generation & lookup tools.☆31Dec 17, 2025Updated 2 months ago
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- Reflective DLL self-loading as a library☆21May 3, 2025Updated 10 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆63Dec 25, 2025Updated 2 months ago
- Tiny Windows executable that outputs version information about the OS.☆11Feb 1, 2026Updated last month
- Awesome MalDev Links☆39Updated this week
- Use Rust to implement some Red Team techniques :)☆13Nov 11, 2024Updated last year
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- A Payload Analysis Framework☆117Oct 9, 2025Updated 4 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆76Feb 24, 2026Updated last week
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Jan 28, 2026Updated last month
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- ☆31Feb 28, 2025Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated 11 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated 11 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 7 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated 11 months ago
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Sep 3, 2025Updated 6 months ago
- The RedStack DB extracted as an Obsidian Vault☆41Dec 25, 2025Updated 2 months ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last week
- Register various user actions - keystrokes on the computer keyboard, movements and mouse keystrokes☆25Dec 26, 2024Updated last year
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated 2 months ago
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆99Dec 22, 2025Updated 2 months ago
- A small How-To on creating your own weaponized WSL file☆121Jul 23, 2025Updated 7 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- ☆127Dec 12, 2025Updated 2 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆116Oct 6, 2025Updated 4 months ago
- Backend development stack for agents☆29Jul 30, 2025Updated 7 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆137Apr 18, 2025Updated 10 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago