Proof-of-Concept to evade auditd by tampering via ptrace
☆19Aug 3, 2023Updated 2 years ago
Alternatives and similar repositories for daphne
Users that are interested in daphne are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆43Apr 14, 2024Updated last year
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- ☆36May 27, 2024Updated last year
- A malicous Golang Package☆15Apr 21, 2025Updated 10 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Persist like a Dodder☆68May 19, 2025Updated 9 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Reverse Engineering and Debugging Malware☆32Feb 27, 2023Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- ☆84May 19, 2024Updated last year
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- ☆57Apr 19, 2023Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- ☆83Nov 1, 2023Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- ☆25Apr 28, 2024Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆33Feb 15, 2026Updated 2 weeks ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆16May 10, 2024Updated last year
- ☆36Feb 12, 2026Updated 2 weeks ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- ☆31Jul 26, 2024Updated last year