danzek / awesome-lol-commonly-abusedView external linksLinks
Awesome list of Living off the Land (LOL) methods, tools, and features commonly abused by attackers
☆34Apr 2, 2025Updated 10 months ago
Alternatives and similar repositories for awesome-lol-commonly-abused
Users that are interested in awesome-lol-commonly-abused are comparing it to the libraries listed below
Sorting:
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆24Jun 11, 2025Updated 8 months ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- JS / Python3 / PHP Lib to work with UTF8 polytonic greek and latin☆10Sep 11, 2024Updated last year
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- Aptech's E project☆16Feb 7, 2026Updated last week
- Repository for tools used for the OSCP☆22Sep 18, 2025Updated 4 months ago
- ☆16Aug 2, 2025Updated 6 months ago
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆20Aug 3, 2024Updated last year
- DNS Tunneling as net.Conn☆16Dec 22, 2024Updated last year
- Python script for parsing ESET (NOD32) virlog.dat file.☆14Sep 28, 2017Updated 8 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆120Sep 8, 2024Updated last year
- A Rust-based dropper for shellcode payloads.☆72Mar 21, 2025Updated 10 months ago
- UAC Bypass using RequestTrace scheduled task☆23Mar 13, 2025Updated 11 months ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆21Jan 1, 2025Updated last year
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- The Multi-Capacity and Multi-Level Localization Project tackles the complex problem of finding optimal locations for elements such as fac…☆14Aug 19, 2025Updated 5 months ago
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- ☆27Jul 13, 2025Updated 7 months ago
- ☆22Jan 31, 2023Updated 3 years ago
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- Open Source eBPF Malware Analysis Framework☆54Oct 20, 2024Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A tool for fetching DFIR and other GitHub tools.☆25Aug 2, 2025Updated 6 months ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- PPID Spoofing☆19Dec 26, 2020Updated 5 years ago
- ULPatch is open source user space live patch tool.☆13Jan 11, 2026Updated last month
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Nov 19, 2024Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- ☆24Mar 12, 2025Updated 11 months ago
- ☆33Jan 23, 2025Updated last year
- Example Golang code to access Azure Active Directory (AD) using OAuth2☆21Nov 29, 2017Updated 8 years ago
- Open platform for sharing confirmed Malware samples☆38Nov 9, 2024Updated last year
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆117Jun 30, 2024Updated last year
- DAG-based workflow engine for Android and low-resource environments, built for mobile-first automation..☆28Oct 17, 2025Updated 4 months ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- RoastStack is an AI-powered app that generates hilariously savage roasts for your technology stack. Just enter your frameworks, databases…☆20Sep 11, 2025Updated 5 months ago
- Lightweight PDB symbol parser and resolver☆28Oct 28, 2024Updated last year
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago