AV/EDR companies netblocks
☆18Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for av-edr-urls
Users that are interested in av-edr-urls are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 8 months ago
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 3 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆151Apr 18, 2025Updated 11 months ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Parses logs created by Cobalt Strike, Brute Ratel, OC2 and creates an SQLite DB which can be used to create custom reports.☆26Mar 18, 2026Updated last week
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- Convert .reg to registry hive and reciprocally, without elevation☆84Feb 18, 2026Updated last month
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 7 months ago
- ☆38Jun 9, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- Pentesting post exploitation tool for slack☆33Nov 15, 2025Updated 4 months ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆27Nov 23, 2025Updated 4 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- CTFs On Demand☆13Mar 23, 2025Updated last year
- ☆124May 12, 2021Updated 4 years ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 3 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 7 months ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 9 months ago
- WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.☆76Feb 25, 2026Updated last month
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 10 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 11 months ago
- Tool to perform lateral movement between AAD joined devices☆66Jun 8, 2022Updated 3 years ago
- Bof of RegPwn by MDSec☆93Mar 15, 2026Updated 2 weeks ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 3 months ago
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated 3 weeks ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆30Oct 2, 2025Updated 5 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago