☆43Jul 17, 2025Updated 7 months ago
Alternatives and similar repositories for TrollBlacklistDLL
Users that are interested in TrollBlacklistDLL are comparing it to the libraries listed below
Sorting:
- ☆17Jan 9, 2025Updated last year
- ☆23Mar 4, 2025Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆18Feb 29, 2024Updated 2 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Apr 27, 2025Updated 10 months ago
- C2 writen in Rust & Go powered by Tor network.☆152Oct 30, 2025Updated 4 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 3 months ago
- Generate and Manage KeyCredentialLinks☆248Jan 30, 2026Updated last month
- Backdooring VSCode Projects☆126Jun 5, 2025Updated 8 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 9 months ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- Deception implementation through analysis of BloodHound data☆53Oct 9, 2025Updated 4 months ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- ☆16Dec 7, 2025Updated 2 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 7 months ago
- 🛡️Proactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and sea…☆16Oct 14, 2025Updated 4 months ago
- ☆13Apr 8, 2022Updated 3 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Dump Kerberos tickets☆45Aug 4, 2025Updated 7 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆76Oct 27, 2025Updated 4 months ago
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- Indirect Syscall with TartarusGate Approach in Go☆135Jul 8, 2025Updated 7 months ago
- ☆60Jan 9, 2023Updated 3 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 9 months ago
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated last year
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- POC of GITHUB simple C2 in rust☆52Jul 27, 2025Updated 7 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 6 months ago