☆49Apr 9, 2025Updated 10 months ago
Alternatives and similar repositories for AzureFunctionRedirector
Users that are interested in AzureFunctionRedirector are comparing it to the libraries listed below
Sorting:
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 2 months ago
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 11 months ago
- ☆250Jul 31, 2024Updated last year
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆24Jan 15, 2026Updated last month
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Scripts that automate portions of pentests.☆57Feb 13, 2026Updated 2 weeks ago
- Stage 0☆169Dec 18, 2024Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆364Oct 14, 2025Updated 4 months ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- ☆58Feb 16, 2025Updated last year
- Your Skyfall Infrastructure Pack☆89Jan 25, 2026Updated last month
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Jan 28, 2026Updated last month
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆138Jul 2, 2025Updated 7 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆308Mar 31, 2025Updated 11 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- ☆26Nov 25, 2025Updated 3 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 3 months ago
- Leak NTLM via Website tab in teams via MS Office☆78Mar 28, 2024Updated last year
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 8 months ago
- ☆619Feb 5, 2026Updated 3 weeks ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated last month
- ☆38Mar 28, 2025Updated 11 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆37Jul 23, 2025Updated 7 months ago
- Library of BOFs to interact with SQL servers☆23Apr 9, 2025Updated 10 months ago
- ☆85May 15, 2025Updated 9 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆285Jun 8, 2023Updated 2 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Less sugar (entropy) for your binaries☆33Sep 10, 2025Updated 5 months ago
- Sleep obfuscation☆268Dec 13, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- UAC Bypass using UIAccess program QuickAssist☆213Nov 30, 2025Updated 3 months ago