☆16Jun 15, 2025Updated 9 months ago
Alternatives and similar repositories for TrollAMSIdotnet
Users that are interested in TrollAMSIdotnet are comparing it to the libraries listed below
Sorting:
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- Sleep obfuscation in golang based on ekko☆13Jan 16, 2024Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Open-source methodology on pentesting and risk mitigation☆14Oct 20, 2020Updated 5 years ago
- ☆26Aug 11, 2025Updated 7 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 2 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Tiny and fast port scanner (Sliver edition)☆28Feb 17, 2026Updated last month
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆66Jul 9, 2024Updated last year
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆29Oct 2, 2024Updated last year
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 9 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆132Dec 8, 2025Updated 3 months ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 4 months ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆176Dec 19, 2025Updated 2 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- This project is an AES loader for c2 shellcode☆36Jan 24, 2024Updated 2 years ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 5 months ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- ☆29Oct 19, 2024Updated last year
- ☆27Apr 23, 2024Updated last year
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆74Apr 25, 2023Updated 2 years ago
- Anna University Examination Question Paper Generator☆13Aug 10, 2014Updated 11 years ago
- ☆26Nov 9, 2024Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆127Feb 18, 2024Updated 2 years ago
- A Mythic agent for Windows written in C☆162Mar 1, 2026Updated 2 weeks ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆60Feb 27, 2026Updated 2 weeks ago
- Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagemen…☆124Mar 8, 2026Updated last week
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- Do some DLL SideLoading magic☆90Sep 20, 2023Updated 2 years ago