The code I write in my blog
☆94Feb 21, 2026Updated 2 months ago
Alternatives and similar repositories for CodefromBlog
Users that are interested in CodefromBlog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆37Jul 1, 2025Updated 9 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- Templates for developing your own listeners and agents for AdaptixC2.☆49Feb 28, 2026Updated 2 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- Proof-of-Concept code snippets for a variety of different process injection techniques☆23Feb 2, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆133Jan 28, 2026Updated 3 months ago
- ☆50Nov 26, 2025Updated 5 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆166Jun 19, 2025Updated 10 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆51Jul 6, 2025Updated 9 months ago
- WinDbg plugin to trace module transitions from a debugged driver.☆52Dec 22, 2025Updated 4 months ago
- Minimalistic HTTP(S) client for the NT kernel☆61Dec 1, 2025Updated 4 months ago
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 6 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆128Dec 23, 2025Updated 4 months ago
- A keygen for Specter Insight C2☆48Feb 17, 2025Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆181Apr 22, 2026Updated last week
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆107Apr 22, 2026Updated last week
- Shellcode Loader Library.☆15Sep 21, 2025Updated 7 months ago
- BOF to run PE in Cobalt Strike Beacon without console creation☆198Nov 23, 2025Updated 5 months ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆69Feb 17, 2026Updated 2 months ago
- Generate an Alphabetical Polymorphic Shellcode☆139Aug 19, 2025Updated 8 months ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆385Nov 2, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆126Mar 30, 2026Updated 3 weeks ago
- Code execution/injection technique using DLL PEB module structure manipulation☆224Jun 4, 2025Updated 10 months ago
- ☆41Apr 23, 2025Updated last year
- AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 · x64 · x86 · WoW64 · ARM64☆462Mar 7, 2026Updated last month
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆139Apr 6, 2026Updated 3 weeks ago
- Stealthily inject shellcode into an executable☆464Oct 19, 2025Updated 6 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆487Mar 15, 2026Updated last month
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 9 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆30Jun 9, 2025Updated 10 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A tool that supports finding and abusing whitelisted programs to allow arbitrary file writing into the executable folder of Antivirus sof…☆85Nov 1, 2025Updated 5 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 4 months ago
- ☆23Nov 29, 2023Updated 2 years ago
- ☆50Jun 6, 2025Updated 10 months ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated 2 months ago
- ☆54May 31, 2025Updated 10 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆140Dec 8, 2025Updated 4 months ago