The code I write in my blog
☆86Feb 21, 2026Updated last month
Alternatives and similar repositories for CodefromBlog
Users that are interested in CodefromBlog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Jul 1, 2025Updated 9 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- Templates for developing your own listeners and agents for AdaptixC2.☆49Feb 28, 2026Updated last month
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Proof-of-Concept code snippets for a variety of different process injection techniques☆23Feb 2, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆129Jan 28, 2026Updated 2 months ago
- ☆50Nov 26, 2025Updated 4 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆165Jun 19, 2025Updated 9 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 9 months ago
- Minimalistic HTTP(S) client for the NT kernel☆62Dec 1, 2025Updated 4 months ago
- WinDbg plugin to trace module transitions from a debugged driver.☆51Dec 22, 2025Updated 3 months ago
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 5 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆127Dec 23, 2025Updated 3 months ago
- A keygen for Specter Insight C2☆48Feb 17, 2025Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆181Jan 6, 2026Updated 3 months ago
- Shellcode Loader Library.☆14Sep 21, 2025Updated 6 months ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆68Feb 17, 2026Updated last month
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆115Mar 30, 2026Updated last week
- AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 · x64 · x86 · WoW64 · ARM64☆433Mar 7, 2026Updated last month
- BOF to run PE in Cobalt Strike Beacon without console creation☆196Nov 23, 2025Updated 4 months ago
- Generate an Alphabetical Polymorphic Shellcode☆138Aug 19, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆384Nov 2, 2023Updated 2 years ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆63Feb 27, 2026Updated last month
- Code execution/injection technique using DLL PEB module structure manipulation☆224Jun 4, 2025Updated 10 months ago
- ☆40Apr 23, 2025Updated 11 months ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆138Mar 31, 2026Updated last week
- Stealthily inject shellcode into an executable☆459Oct 19, 2025Updated 5 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆481Mar 15, 2026Updated 3 weeks ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 10 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆29Jul 21, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆30Jun 9, 2025Updated 9 months ago
- A tool that supports finding and abusing whitelisted programs to allow arbitrary file writing into the executable folder of Antivirus sof…☆85Nov 1, 2025Updated 5 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 3 months ago
- ☆23Nov 29, 2023Updated 2 years ago
- ☆48Jun 6, 2025Updated 10 months ago
- ☆55May 31, 2025Updated 10 months ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated last month