This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certain signatures and it will still work.
☆449May 24, 2025Updated 10 months ago
Alternatives and similar repositories for DSViper
Users that are interested in DSViper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆82Apr 28, 2025Updated 10 months ago
- PowerShell & Python tools developed for CTFs and certification exams☆70Aug 10, 2025Updated 7 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆142Mar 28, 2025Updated 11 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 8 months ago
- Port of Cobalt Strike's Process Inject Kit☆192Dec 1, 2024Updated last year
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆398Jul 23, 2025Updated 8 months ago
- A PoC for Early Cascade process injection technique.☆214Jan 30, 2025Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆206Mar 6, 2025Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆541May 9, 2025Updated 10 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆116Mar 8, 2026Updated 2 weeks ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆246Mar 9, 2026Updated 2 weeks ago
- ☆198Mar 28, 2025Updated 11 months ago
- Multiplayer pivoting solution☆493Mar 7, 2026Updated 2 weeks ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆216Oct 19, 2024Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- ☆625Feb 5, 2026Updated last month
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,831Nov 3, 2024Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Nov 2, 2024Updated last year
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆508Mar 7, 2026Updated 2 weeks ago
- Lab used for workshop and CTF☆508Feb 3, 2026Updated last month
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆816Mar 28, 2025Updated 11 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,303Jun 17, 2025Updated 9 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,330Nov 12, 2025Updated 4 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆268Apr 8, 2025Updated 11 months ago
- Powerview on steroids☆903Mar 10, 2026Updated 2 weeks ago
- ☆688Updated this week
- kernel callback removal (Bypassing EDR Detections)☆210Nov 14, 2025Updated 4 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆310Mar 31, 2025Updated 11 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,839Mar 17, 2026Updated last week
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆165Jun 19, 2025Updated 9 months ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆261Feb 21, 2025Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆373Oct 14, 2025Updated 5 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- Indirect Syscall with TartarusGate Approach in Go☆135Jul 8, 2025Updated 8 months ago
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆234Apr 18, 2025Updated 11 months ago
- C2 infrastructure over Microsoft Teams.☆746Jan 15, 2025Updated last year