Detonate malware on VMs and get logs & detection status
☆86Jan 29, 2026Updated last month
Alternatives and similar repositories for DetonatorAgent
Users that are interested in DetonatorAgent are comparing it to the libraries listed below
Sorting:
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- ☆13Jun 26, 2023Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- Awesome MalDev Links☆52Updated this week
- Payload Obfuscation for Red Teams workshop materials☆81Nov 25, 2025Updated 3 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 3 months ago
- ☆19Sep 17, 2025Updated 6 months ago
- Custom Google search engine dedicated to IT security & hacking stuff. Over 240 high-quality sources.☆85Jan 15, 2026Updated 2 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆69Mar 8, 2026Updated last week
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- Nameless C2 - A C2 with all its components written in Rust☆284Sep 26, 2024Updated last year
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 3 months ago
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 9 months ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 11 months ago
- ☆35Dec 21, 2023Updated 2 years ago
- Backend development stack for agents☆29Jul 30, 2025Updated 7 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆52Jan 16, 2026Updated 2 months ago
- ☆17Jul 26, 2018Updated 7 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- RunPE implementation with multiple evasive techniques (2)☆277Sep 25, 2025Updated 5 months ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 4 months ago
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆638Oct 27, 2025Updated 4 months ago
- Click Once + App Domain☆67Feb 23, 2026Updated 3 weeks ago
- ☆59Nov 13, 2024Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆212Mar 7, 2026Updated last week
- A Burp Suite extension for analyzing Next.js Server Actions - server-side functions identified by hash IDs and `Next-Action` headers.☆48Aug 8, 2025Updated 7 months ago
- Source code for complete MALicious softWARE books I & II☆78Oct 10, 2025Updated 5 months ago
- Planning and roadmap for future Ecosyste.ms development☆21Jun 20, 2024Updated last year
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆140Jul 2, 2025Updated 8 months ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 3 months ago
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆26Oct 13, 2025Updated 5 months ago