Shellcode injection using the Windows Debugging API
☆177Jan 4, 2026Updated 2 months ago
Alternatives and similar repositories for DbgNexum
Users that are interested in DbgNexum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆93Jan 2, 2026Updated 2 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆66Jan 5, 2026Updated 2 months ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 3 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- adws enumeration bof☆169Feb 16, 2026Updated last month
- modified mssqlclient from impacket to extract policies from the SCCM database☆46Feb 24, 2026Updated last month
- ☆80Feb 12, 2026Updated last month
- ☆55May 31, 2025Updated 9 months ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Enumerate active EDR's on the system☆152Sep 23, 2025Updated 6 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆129Jan 28, 2026Updated 2 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆200Apr 21, 2025Updated 11 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆84Nov 15, 2025Updated 4 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 9 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆278Feb 5, 2026Updated last month
- A Qemu Proxmox Template builder project using Packer☆73Dec 5, 2025Updated 3 months ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆51Nov 2, 2025Updated 4 months ago
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆155Nov 23, 2025Updated 4 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆81Nov 6, 2025Updated 4 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆125Dec 23, 2025Updated 3 months ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆231Mar 13, 2026Updated 2 weeks ago
- Prevent in-process process termination by patching exit APIs☆65Nov 9, 2025Updated 4 months ago
- A C# utility for interacting with SCOM☆97Dec 2, 2025Updated 3 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆189Jan 11, 2026Updated 2 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 6 months ago
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆642Oct 27, 2025Updated 5 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆79Oct 27, 2025Updated 5 months ago
- ☆86May 15, 2025Updated 10 months ago
- ☆43Dec 24, 2025Updated 3 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆611Feb 21, 2024Updated 2 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆263Jun 29, 2024Updated last year