Ping-based Information Lookup and Outbound Transfer
☆80Apr 16, 2024Updated last year
Alternatives and similar repositories for PILOT
Users that are interested in PILOT are comparing it to the libraries listed below
Sorting:
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 11 months ago
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆155Jun 10, 2024Updated last year
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 7 months ago
- Get root via TTY / TIOCSTI stuffing☆77May 12, 2025Updated 9 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 8 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 11 months ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- Blog/Journal on how to backdoor VSCode extensions☆77Feb 24, 2026Updated last week
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Jul 11, 2025Updated 7 months ago
- Extracting NetNTLM without touching lsass.exe☆244Nov 27, 2023Updated 2 years ago
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- ☆25Oct 1, 2025Updated 5 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆237Aug 25, 2024Updated last year
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆174May 13, 2024Updated last year
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆204Dec 27, 2023Updated 2 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- 🔥📜 Forbidden collection of Red Team sorcery 📜🔥☆340Feb 20, 2026Updated 2 weeks ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- slides for talk given during uscg 2023 combine☆38Sep 6, 2023Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11☆378Jul 30, 2023Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- ☆60Dec 15, 2023Updated 2 years ago
- Kill AV/EDR leveraging BYOVD attack☆391Jul 11, 2023Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 11 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated 2 weeks ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- winPEAS, but for Active Directory☆173Apr 1, 2025Updated 11 months ago