☆41Feb 12, 2026Updated last month
Alternatives and similar repositories for Simple-Crystal-Palace-RDLL-template-for-Adaptix
Users that are interested in Simple-Crystal-Palace-RDLL-template-for-Adaptix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆49Dec 21, 2025Updated 3 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆30Oct 2, 2025Updated 5 months ago
- Convert your shellcode into an ASCII string☆126Jun 27, 2025Updated 9 months ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆17May 10, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆46Dec 30, 2025Updated 3 months ago
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 7 months ago
- ☣️ Simple Master Boot Record (MBR) override example☆15Jul 22, 2017Updated 8 years ago
- Thats it! An Open-Source Windows UEFI Rootkit☆29Jul 19, 2025Updated 8 months ago
- A Windows PE loader / manual mapper for executables (x86 and x64) with full TLS (Thread Local Storage) support.☆92Oct 27, 2025Updated 5 months ago
- COM-based DLL Surrogate Injection☆151Dec 9, 2025Updated 3 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 8 months ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆48Nov 9, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 一个基于 Nostr 去中心的匿名远程控制工具 A decentralized anonymous remote control tool based on Nostr☆22Apr 14, 2025Updated 11 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆28May 13, 2025Updated 10 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Registers Vectored Exception Handlers by directly manipulating internal LdrpVectorHandlerList structure instead of calling RtlAddVectored…☆36Jan 18, 2026Updated 2 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 9 months ago
- Overview of MS Defender☆118Feb 20, 2026Updated last month
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆27Apr 21, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- find dll base addresses without PEB WALK☆162Jul 13, 2025Updated 8 months ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 10 months ago
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 3 months ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 10 months ago
- Execute commands across Windows and Linux systems using multiple RCE methods☆86Mar 2, 2026Updated 3 weeks ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆108Aug 21, 2024Updated last year
- User-Defined C2 BOF Template☆30Nov 24, 2025Updated 4 months ago
- Find jmp gadgets for call stack spoofing.☆79Oct 1, 2025Updated 5 months ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆151Apr 18, 2025Updated 11 months ago
- All-in-one Scoring Engine☆31Updated this week