This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certain signatures and it will still work.
☆448May 24, 2025Updated 10 months ago
Alternatives and similar repositories for DSViper
Users that are interested in DSViper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆82Apr 28, 2025Updated 11 months ago
- PowerShell & Python tools developed for CTFs and certification exams☆71Aug 10, 2025Updated 8 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆142Mar 28, 2025Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 9 months ago
- Port of Cobalt Strike's Process Inject Kit☆193Dec 1, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Shellcode packer for CTFs and pentest / red team exams aiming for AV evasion!☆137Apr 4, 2026Updated last week
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 8 months ago
- A PoC for Early Cascade process injection technique.☆215Jan 30, 2025Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆545May 9, 2025Updated 11 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆247Mar 9, 2026Updated last month
- ☆200Mar 28, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Multiplayer pivoting solution☆497Mar 7, 2026Updated last month
- Stage 0☆168Dec 18, 2024Updated last year
- ☆628Feb 5, 2026Updated 2 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,849Nov 3, 2024Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆466Nov 2, 2024Updated last year
- Lab used for workshop and CTF☆510Feb 3, 2026Updated 2 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆509Mar 7, 2026Updated last month
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆816Mar 28, 2025Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,312Mar 27, 2026Updated 2 weeks ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,347Nov 12, 2025Updated 5 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- Powerview on steroids☆918Updated this week
- kernel callback removal (Bypassing EDR Detections)☆213Nov 14, 2025Updated 5 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,969Mar 22, 2026Updated 3 weeks ago
- ☆692Mar 23, 2026Updated 3 weeks ago
- Cobalt Strike BOF for evasive .NET assembly execution☆313Mar 31, 2025Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆166Jun 19, 2025Updated 9 months ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- C2 infrastructure over Microsoft Teams.☆749Jan 15, 2025Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆381Oct 14, 2025Updated 6 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 9 months ago
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- Indirect Syscall with TartarusGate Approach in Go☆135Jul 8, 2025Updated 9 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆235Apr 18, 2025Updated 11 months ago