☆37Feb 12, 2026Updated 3 weeks ago
Alternatives and similar repositories for Simple-Crystal-Palace-RDLL-template-for-Adaptix
Users that are interested in Simple-Crystal-Palace-RDLL-template-for-Adaptix are comparing it to the libraries listed below
Sorting:
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆17May 10, 2024Updated last year
- ☆49Dec 21, 2025Updated 2 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 7 months ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆42Dec 30, 2025Updated 2 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆25Apr 21, 2025Updated 10 months ago
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 7 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆28May 13, 2025Updated 9 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- A Windows PE loader / manual mapper for executables (x86 and x64) with full TLS (Thread Local Storage) support.☆88Oct 27, 2025Updated 4 months ago
- 一个基于 Nostr 去中心的匿名远程控制工具 A decentralized anonymous remote control tool based on Nostr☆21Apr 14, 2025Updated 10 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 9 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 9 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆30Oct 2, 2025Updated 5 months ago
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 9 months ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- 🔐 RFC 7539-compliant implementation of the ChaCha20 stream cypher algorithm☆31Apr 5, 2025Updated 11 months ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- Find jmp gadgets for call stack spoofing.☆75Oct 1, 2025Updated 5 months ago
- Obfuscate the bytes of your payload with an association dictionary☆74Nov 7, 2025Updated 4 months ago
- find dll base addresses without PEB WALK☆161Jul 13, 2025Updated 7 months ago
- COM-based DLL Surrogate Injection☆142Dec 9, 2025Updated 3 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆145Apr 18, 2025Updated 10 months ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆55Feb 27, 2026Updated last week
- Convert your shellcode into an ASCII string☆127Jun 27, 2025Updated 8 months ago
- A pointer encryption library intended for Red Team implant design in Rust.☆66Oct 1, 2025Updated 5 months ago
- Overview of MS Defender☆108Feb 20, 2026Updated 2 weeks ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 2 months ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago