This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certain signatures and it will still work.
☆446May 24, 2025Updated 9 months ago
Alternatives and similar repositories for DSViper
Users that are interested in DSViper are comparing it to the libraries listed below
Sorting:
- ☆82Apr 28, 2025Updated 10 months ago
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆204Mar 6, 2025Updated 11 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 7 months ago
- Port of Cobalt Strike's Process Inject Kit☆191Dec 1, 2024Updated last year
- ☆198Mar 28, 2025Updated 11 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆539May 9, 2025Updated 9 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆215Oct 19, 2024Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆246Nov 2, 2025Updated 4 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆169Jun 29, 2025Updated 8 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆813Mar 28, 2025Updated 11 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆114Updated this week
- ☆620Feb 5, 2026Updated last month
- Indirect Syscall with TartarusGate Approach in Go☆135Jul 8, 2025Updated 7 months ago
- Lab used for workshop and CTF☆501Feb 3, 2026Updated last month
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,823Nov 3, 2024Updated last year
- PowerShell & Python tools developed for CTFs and certification exams☆70Aug 10, 2025Updated 6 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Nov 2, 2024Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆266Apr 8, 2025Updated 10 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,296Jun 17, 2025Updated 8 months ago
- Multiplayer pivoting solution☆489Nov 3, 2025Updated 4 months ago
- kernel callback removal (Bypassing EDR Detections)☆211Nov 14, 2025Updated 3 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,314Nov 12, 2025Updated 3 months ago
- Adversary Emulation Framework☆130Jul 1, 2025Updated 8 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆502Jan 23, 2026Updated last month
- Good CLR Host with Native patchless AMSI Bypass☆103Apr 18, 2025Updated 10 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆308Mar 31, 2025Updated 11 months ago
- ☆662Updated this week
- Generate and Manage KeyCredentialLinks☆248Jan 30, 2026Updated last month
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 8 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆140Mar 28, 2025Updated 11 months ago
- C2 infrastructure over Microsoft Teams.☆739Jan 15, 2025Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆779Jan 26, 2026Updated last month
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆334Mar 6, 2025Updated 11 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,758Updated this week
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆226Apr 18, 2025Updated 10 months ago
- ☆319Jun 28, 2023Updated 2 years ago