☆64May 31, 2024Updated last year
Alternatives and similar repositories for RelabelAbuse
Users that are interested in RelabelAbuse are comparing it to the libraries listed below
Sorting:
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- ☆68Oct 10, 2023Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆58Sep 7, 2024Updated last year
- Position-independent Reflective Loader for macOS☆112Feb 19, 2026Updated last week
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Nov 29, 2024Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Aug 21, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- ☆39Oct 12, 2022Updated 3 years ago
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- ☆274Jan 14, 2023Updated 3 years ago
- ForsHops☆59Mar 25, 2025Updated 11 months ago
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- ☆121Nov 21, 2024Updated last year
- ☆44Oct 16, 2023Updated 2 years ago
- ☆40Oct 8, 2024Updated last year
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- ☆100Sep 1, 2024Updated last year
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆285Jun 18, 2025Updated 8 months ago
- A set of programs for analyzing common vulnerabilities in COM☆246Sep 8, 2024Updated last year
- TypeLib persistence technique☆140Oct 22, 2024Updated last year
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Process Injection using Thread Name☆299Apr 18, 2025Updated 10 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Aug 23, 2025Updated 6 months ago
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆110Mar 25, 2024Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Apr 29, 2024Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆92Nov 19, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆281Sep 18, 2024Updated last year
- ☆152Oct 2, 2023Updated 2 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- Beacon Object File (BOF) Template☆63Feb 6, 2026Updated 3 weeks ago