☆16Jun 15, 2025Updated 8 months ago
Alternatives and similar repositories for TrollAMSIdotnet
Users that are interested in TrollAMSIdotnet are comparing it to the libraries listed below
Sorting:
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated last year
- Sleep obfuscation in golang based on ekko☆13Jan 16, 2024Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Open-source methodology on pentesting and risk mitigation☆14Oct 20, 2020Updated 5 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆26Dec 20, 2025Updated 2 months ago
- ☆26Aug 11, 2025Updated 6 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Tiny and fast port scanner (Sliver edition)☆27Feb 17, 2026Updated last week
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆28Oct 2, 2024Updated last year
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 8 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆129Dec 8, 2025Updated 2 months ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 4 months ago
- Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagemen…☆80Feb 16, 2026Updated last week
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆174Dec 19, 2025Updated 2 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆33Sep 21, 2024Updated last year
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- ☆24Apr 23, 2024Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆34Oct 1, 2025Updated 4 months ago
- This project is an AES loader for c2 shellcode☆36Jan 24, 2024Updated 2 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- ☆29Oct 19, 2024Updated last year
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆74Apr 25, 2023Updated 2 years ago
- A Mythic agent for Windows written in C☆156Updated this week
- ☆26Nov 9, 2024Updated last year
- Anna University Examination Question Paper Generator☆13Aug 10, 2014Updated 11 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆127Feb 18, 2024Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Mar 6, 2025Updated 11 months ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago
- The classic launcher, evolved. Fast, Go-based command library equipped with 200+ cybersecurity cheat-sheets. Just install and start hacki…☆93Jan 16, 2026Updated last month
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- Do some DLL SideLoading magic☆89Sep 20, 2023Updated 2 years ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 5 months ago