☆27Oct 15, 2025Updated 5 months ago
Alternatives and similar repositories for gift
Users that are interested in gift are comparing it to the libraries listed below
Sorting:
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 3 years ago
- ☆17Jan 9, 2025Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Communicate undetected in plain sight using zero width obfuscation.☆15Nov 5, 2021Updated 4 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- ☆31Sep 12, 2024Updated last year
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 3 months ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 3 months ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Sep 1, 2023Updated 2 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 3 years ago
- Talk2Me interacts with OpenAI's language model to generate text responses and saves the conversation for future reference.☆15Sep 6, 2024Updated last year
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Jul 9, 2023Updated 2 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- ☆47Jan 31, 2024Updated 2 years ago
- The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/☆210Jan 29, 2023Updated 3 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- Tool to manage user privileges☆31Sep 4, 2019Updated 6 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆53Updated this week
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 8 months ago
- shellcode transformation tool for YARA evasion☆58Dec 17, 2025Updated 3 months ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆81Nov 6, 2025Updated 4 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- ☆124May 12, 2021Updated 4 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Jul 2, 2024Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- slides for talk given during uscg 2023 combine☆38Sep 6, 2023Updated 2 years ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago