☆23Dec 31, 2025Updated 2 months ago
Alternatives and similar repositories for DockPiler
Users that are interested in DockPiler are comparing it to the libraries listed below
Sorting:
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆12Jun 3, 2025Updated 9 months ago
- Styx is an cross-platform GUI interface for HackTheBox made in GoLang☆29Feb 8, 2026Updated 3 weeks ago
- ☆36Jul 1, 2025Updated 8 months ago
- Azure apim mini proxy☆45Feb 16, 2026Updated 2 weeks ago
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆33Feb 16, 2026Updated 2 weeks ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆129Oct 23, 2025Updated 4 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- ☆26Aug 11, 2025Updated 6 months ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- Bloodhound python Ingestor using ADWS☆32Feb 4, 2026Updated last month
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 8 months ago
- Tiny and fast port scanner (Sliver edition)☆27Feb 17, 2026Updated 2 weeks ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆106Feb 25, 2026Updated last week
- ☆171Oct 21, 2025Updated 4 months ago
- ☆35Feb 5, 2026Updated 3 weeks ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- Offensive Web is a documentation website about web security research, bypass and new exploitation techniques.☆31Feb 14, 2026Updated 2 weeks ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- Client-side Encrypted Upload Server Python Script☆66Jul 10, 2025Updated 7 months ago
- ☆58Dec 10, 2025Updated 2 months ago
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆52Oct 16, 2025Updated 4 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Dec 4, 2025Updated 3 months ago
- From Zero To Hero☆34Jul 17, 2025Updated 7 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆214Jan 12, 2026Updated last month
- ☆41Feb 20, 2025Updated last year
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆71Dec 26, 2025Updated 2 months ago
- A small How-To on creating your own weaponized WSL file☆121Jul 23, 2025Updated 7 months ago
- Mockingjay process self injection POC☆48Aug 8, 2023Updated 2 years ago
- Network Fuzzing Framework☆64Jan 17, 2026Updated last month
- ☆50Jun 4, 2025Updated 9 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago
- A Rust template for writing Beacon Object Files (BOFs)☆100Feb 11, 2026Updated 3 weeks ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆104Jan 26, 2026Updated last month
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 5 months ago