☆53Jul 8, 2025Updated 8 months ago
Alternatives and similar repositories for TrollDisappearKey
Users that are interested in TrollDisappearKey are comparing it to the libraries listed below
Sorting:
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- Good CLR Host with Native patchless AMSI Bypass☆105Apr 18, 2025Updated 11 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Simple .NET loader for loading and executing Powershell payloads☆17Nov 5, 2021Updated 4 years ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆132Dec 8, 2025Updated 3 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 10 months ago
- Indirect Syscall with TartarusGate Approach in Go☆135Jul 8, 2025Updated 8 months ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆59Oct 10, 2025Updated 5 months ago
- ☆50Jul 9, 2025Updated 8 months ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- ☆54Mar 26, 2025Updated 11 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 8 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆162Aug 30, 2025Updated 6 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆13Mar 3, 2025Updated last year
- ☆38Jan 7, 2025Updated last year
- A python library to create BloodHound OpenGraphs☆56Feb 4, 2026Updated last month
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 4 months ago
- This code silently installs Chrome extensions on Mac, Windows, and Linux☆131Jul 22, 2025Updated 7 months ago
- ☆82Apr 28, 2025Updated 10 months ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆20Jul 16, 2024Updated last year
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 8 months ago
- early cascade injection PoC based on Outflanks blog post☆239Nov 7, 2024Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆93Jan 8, 2025Updated last year
- ACL Viewer for Windows☆133May 4, 2025Updated 10 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- General Purpose OpSec Server☆112Mar 13, 2026Updated last week
- TokenCert☆102Nov 15, 2024Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆541May 9, 2025Updated 10 months ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago