AV Evasion, a Red Team Tool - Fiber, APC, PNG and UUID
☆21Sep 7, 2021Updated 4 years ago
Alternatives and similar repositories for cthulhu
Users that are interested in cthulhu are comparing it to the libraries listed below
Sorting:
- Penetration testing “drop box”☆14Sep 12, 2018Updated 7 years ago
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- A marriage between Octoberfest7/OSEP-Tools and chvancooten/OSEP-Code-Snippets with some improvements/additions☆99Jan 3, 2026Updated 2 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆143Nov 3, 2025Updated 4 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 5 months ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆44Jan 22, 2025Updated last year
- CPL remote trigger☆43Dec 28, 2025Updated 2 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆43Jan 14, 2026Updated last month
- Review of AWAE.OSWE☆31Mar 12, 2022Updated 3 years ago
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆286Feb 2, 2026Updated last month
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆85Feb 26, 2023Updated 3 years ago
- MOVEit CVE-2023-34362☆140Jun 26, 2023Updated 2 years ago
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- Evasion kit for Cobalt Strike☆390Feb 21, 2026Updated 2 weeks ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- ☆10Mar 2, 2026Updated last week
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 2 months ago
- CVE-2022-1388 F5 BIG-IP iControl REST RCE☆37May 9, 2022Updated 3 years ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 11 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- Guides for locking down a computer☆12Mar 4, 2023Updated 3 years ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆56Jul 13, 2025Updated 7 months ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- 本来要自己写个脚本存放poc,发现有大佬已经写了个轮子,使用J2ExpSuite,后期添加POC☆12Feb 17, 2023Updated 3 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- sqli-labs学习记录☆12Jan 15, 2020Updated 6 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- ☆44Jul 5, 2024Updated last year
- GCP cloud security CTF☆47Jun 25, 2025Updated 8 months ago
- RCE on Apache Solr 8.3.1☆42May 6, 2023Updated 2 years ago
- Game Hacking Adventures Scripts & Tools☆20Dec 29, 2012Updated 13 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- This extension will allow you to set the default of product custom options☆11Feb 2, 2020Updated 6 years ago
- My CTF Challenge☆11Feb 5, 2026Updated last month
- ☆11Nov 29, 2025Updated 3 months ago