Create a lnk shortcut file for Windows
☆25Apr 1, 2026Updated last month
Alternatives and similar repositories for mklnk
Users that are interested in mklnk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Apr 30, 2021Updated 5 years ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated 2 months ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Feb 9, 2021Updated 5 years ago
- ☆10Apr 2, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆72Aug 2, 2022Updated 3 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Python based Office Macro Generator. Also does rudamentary obfuscation.☆12Jun 6, 2016Updated 9 years ago
- POC for CVE-2025-54918 and a technical demonstration.☆57Jan 12, 2026Updated 3 months ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- libdt is part of the "Huorong eXtendible Stream Scan Engine" project copyright by Huorong Borui (Beijing) Technology Co., Ltd.☆14Aug 17, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆51Jan 28, 2026Updated 3 months ago
- Project template for windows kernel development.☆14Jun 25, 2023Updated 2 years ago
- Rewriting Armitage in Kotlin for the latest Metasploit☆16Apr 12, 2023Updated 3 years ago
- Thanks to @d35ha☆13Aug 16, 2021Updated 4 years ago
- PoC for hiding data within $MFT☆12Aug 14, 2014Updated 11 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Apr 1, 2026Updated last month
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆27Mar 19, 2025Updated last year
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- This is a Sharp assembly loader in PowerShell☆12Oct 23, 2025Updated 6 months ago
- 一款 Go 语言编写的小巧、简洁、快速采集 fofa 数据导出到 Excel 表单的小工具。☆33Mar 16, 2023Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆38Oct 13, 2021Updated 4 years ago
- PHP 8 Sandbox Escape☆84Feb 28, 2026Updated 2 months ago
- System Security Project☆13Feb 28, 2017Updated 9 years ago
- ☆27Mar 6, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆116Apr 22, 2026Updated last week
- x64dbg plugin to bypass Themida 3.1.x+ Anti-Debug, VM Detection & Monitoring Software☆19Aug 3, 2023Updated 2 years ago
- ☆40May 21, 2022Updated 3 years ago
- rdp2tcp: open tcp tunnel through remote desktop connection.☆29May 21, 2021Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- ☆18Jan 8, 2026Updated 3 months ago