h41th / Simple-Crystal-Palace-RDLL-template-for-AdaptixView external linksLinks
☆34Updated this week
Alternatives and similar repositories for Simple-Crystal-Palace-RDLL-template-for-Adaptix
Users that are interested in Simple-Crystal-Palace-RDLL-template-for-Adaptix are comparing it to the libraries listed below
Sorting:
- ☆48Dec 21, 2025Updated last month
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆41Dec 30, 2025Updated last month
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 6 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 6 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆25Apr 21, 2025Updated 9 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27May 13, 2025Updated 9 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 7 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 6 months ago
- 一个基于 Nostr 去中心的匿名远程控制工具 A decentralized anonymous remote control tool based on Nostr☆21Apr 14, 2025Updated 10 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 8 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 9 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆29Oct 2, 2025Updated 4 months ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 8 months ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated 11 months ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- 🔐 RFC 7539-compliant implementation of the ChaCha20 stream cypher algorithm☆28Apr 5, 2025Updated 10 months ago
- Find jmp gadgets for call stack spoofing.☆75Oct 1, 2025Updated 4 months ago
- Obfuscate the bytes of your payload with an association dictionary☆75Nov 7, 2025Updated 3 months ago
- A pointer encryption library intended for Red Team implant design in Rust.☆64Oct 1, 2025Updated 4 months ago
- COM-based DLL Surrogate Injection☆143Dec 9, 2025Updated 2 months ago
- Convert your shellcode into an ASCII string☆127Jun 27, 2025Updated 7 months ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 2 months ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated 11 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆102Jan 29, 2026Updated 2 weeks ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Oct 30, 2024Updated last year
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆109Jan 18, 2026Updated 3 weeks ago
- Linux Process Injection via Seccomp Notifier☆83Dec 9, 2025Updated 2 months ago
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51May 16, 2025Updated 9 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago