This repo contains C/C++ snippets that can be handy in specific offensive scenarios.
☆12May 31, 2024Updated last year
Alternatives and similar repositories for OffensiveCpp
Users that are interested in OffensiveCpp are comparing it to the libraries listed below
Sorting:
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Jul 16, 2024Updated last year
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- ☆32Updated this week
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 6 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Nov 29, 2022Updated 3 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆127Jan 1, 2026Updated 2 months ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 6 months ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- ☆15Feb 5, 2025Updated last year
- ☆44Apr 27, 2024Updated last year
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆182Dec 23, 2025Updated 2 months ago
- Vulnerabilities exploitation examples, python☆23May 22, 2023Updated 2 years ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated last year
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆40Sep 16, 2021Updated 4 years ago
- Check Your IP Address☆10Mar 12, 2022Updated 3 years ago
- let's explore the structure of holography。让我们探索‘全息’技术的结构☆29Aug 7, 2025Updated 6 months ago
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- Allows invisible Payloads to be decoded and encoded.☆28Mar 5, 2024Updated 2 years ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- hijacks the discord overlay and draws imgui inside of it while remaining flagless due to the discord overlay devs being retarded☆18Apr 29, 2025Updated 10 months ago
- Public repo of some woking evilginx phishlets☆39Nov 4, 2024Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- Omni CloudNative platform featuring intelligent-automation technology and advanced scalable-architecture for modern gateway☆25Feb 10, 2026Updated 3 weeks ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- This Windows Script will help to find the Wi-Fi Password, which connected to your system earlier.☆14May 21, 2021Updated 4 years ago
- ☆21May 19, 2024Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- 🐙 Yusher Web Browsers☆12Nov 2, 2021Updated 4 years ago
- A small tool to block Windows shutdown☆15Oct 6, 2022Updated 3 years ago
- A semantic analysis tool for debugging python code☆24Jan 12, 2026Updated last month
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago