This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certain signatures and it will still work.
☆451May 24, 2025Updated 11 months ago
Alternatives and similar repositories for DSViper
Users that are interested in DSViper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆81Apr 28, 2025Updated last year
- PowerShell & Python tools developed for CTFs and certification exams☆71Aug 10, 2025Updated 8 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆142Mar 28, 2025Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 10 months ago
- Port of Cobalt Strike's Process Inject Kit☆193Dec 1, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Shellcode packer for CTFs and pentest / red team exams aiming for AV evasion!☆143Apr 4, 2026Updated last month
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆401Jul 23, 2025Updated 9 months ago
- A PoC for Early Cascade process injection technique.☆216Jan 30, 2025Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆552May 9, 2025Updated 11 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆247Mar 9, 2026Updated last month
- ☆200Mar 28, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Multiplayer pivoting solution☆510Updated this week
- Stage 0☆169Dec 18, 2024Updated last year
- ☆628Feb 5, 2026Updated 3 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Nov 2, 2024Updated last year
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆513Mar 7, 2026Updated last month
- Lab used for workshop and CTF☆514Feb 3, 2026Updated 3 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆817Mar 28, 2025Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,320Mar 27, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,367Nov 12, 2025Updated 5 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- Powerview on steroids☆932Apr 13, 2026Updated 3 weeks ago
- kernel callback removal (Bypassing EDR Detections)☆216Nov 14, 2025Updated 5 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆317Mar 31, 2025Updated last year
- ☆699Apr 26, 2026Updated last week
- AdaptixC2 is a highly modular advanced redteam toolkit☆3,066Mar 22, 2026Updated last month
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆166Jun 19, 2025Updated 10 months ago
- Adversary Emulation Framework☆130Jul 1, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆264Feb 21, 2025Updated last year
- C2 infrastructure over Microsoft Teams.☆749Jan 15, 2025Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆386Oct 14, 2025Updated 6 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- Indirect Syscall with TartarusGate Approach in Go☆136Jul 8, 2025Updated 9 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆236Apr 18, 2025Updated last year