Attack chain emulator. Write recipes for initial access easily
☆23Feb 26, 2025Updated last year
Alternatives and similar repositories for ace-firefist
Users that are interested in ace-firefist are comparing it to the libraries listed below
Sorting:
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 2 months ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆43Nov 9, 2025Updated 3 months ago
- Reflective DLL self-loading as a library☆21May 3, 2025Updated 9 months ago
- ☆12Feb 7, 2023Updated 3 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- ☆60Jan 9, 2023Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- ☆17Jan 9, 2025Updated last year
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- A shellcode runner / injector / hollower in Go, for windows☆26May 22, 2022Updated 3 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated last year
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Click Once + App Domain☆64Feb 23, 2026Updated last week
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆65Updated this week
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Jun 1, 2024Updated last year
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- ☆38Mar 28, 2025Updated 11 months ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- Azure AD Identity Protection Cookie Spoofing☆35Sep 2, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆50Jan 19, 2026Updated last month
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Parse SDDL strings☆37Apr 1, 2024Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Lightweight Threat Detection System - (Base)☆15Apr 15, 2024Updated last year
- ☆13Jul 15, 2021Updated 4 years ago
- Bunch of BOF files☆39Jun 30, 2025Updated 8 months ago