andrewjlamarche / ubiquity-toolkitView external linksLinks
A collection of statically-linked tools targeted to run on almost any linux system.
☆34Sep 2, 2025Updated 5 months ago
Alternatives and similar repositories for ubiquity-toolkit
Users that are interested in ubiquity-toolkit are comparing it to the libraries listed below
Sorting:
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- ☆27May 6, 2024Updated last year
- ☆42Feb 18, 2025Updated 11 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- ☆31Dec 5, 2024Updated last year
- ☆15Jan 26, 2023Updated 3 years ago
- Rite Of Passage ROP Injector☆34Aug 4, 2019Updated 6 years ago
- A cross platform Go library to work with Windows Security Descriptors☆40Feb 10, 2026Updated last week
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆19Apr 17, 2024Updated last year
- basic C programs for intro to x86 reverse engineering☆15Oct 5, 2018Updated 7 years ago
- Fast Windows post-exploitation wins after initial access.☆28Jan 28, 2026Updated 2 weeks ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆34Feb 2, 2026Updated 2 weeks ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆77Jan 24, 2026Updated 3 weeks ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- ☆20Nov 5, 2025Updated 3 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- ☆16May 15, 2021Updated 4 years ago
- ☆124Mar 23, 2025Updated 10 months ago
- Keep it secret, keep it safe☆80Feb 6, 2025Updated last year
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- ☆50Jun 28, 2022Updated 3 years ago
- Example of building an application verifer DLL☆51Jun 1, 2024Updated last year
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- Execute commands in other Sessions☆91Jul 29, 2024Updated last year
- Exploit for CVE-2023-32364☆22Sep 26, 2023Updated 2 years ago
- Secretly record audio and video with chromium based browsers.☆23Feb 14, 2024Updated 2 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year