Demo code JavaScript POC that tricks user into sending Windows hash to responder
☆37Dec 12, 2025Updated 3 months ago
Alternatives and similar repositories for DragonHash
Users that are interested in DragonHash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 6 months ago
- ☆164May 5, 2025Updated 10 months ago
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 7 months ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆49Mar 30, 2025Updated 11 months ago
- ☆17Jan 9, 2025Updated last year
- JSONPath-plus Remote Code Execution☆20Feb 26, 2025Updated last year
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆67Dec 15, 2025Updated 3 months ago
- A small How-To on creating your own weaponized WSL file☆124Jul 23, 2025Updated 8 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Generate an Alphabetical Polymorphic Shellcode☆137Aug 19, 2025Updated 7 months ago
- ☆100Sep 1, 2024Updated last year
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Remote-shellcode loader in pure Rust☆25Jan 7, 2025Updated last year
- Golang search engine scraper intended for identification of published ClickOnce deployments☆92Nov 19, 2024Updated last year
- iOS 18.5 Beta 4(and below) MobileCoreService persistence exploit. Discovered by me!☆49May 4, 2025Updated 10 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- ☆121Nov 21, 2024Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- find dll base addresses without PEB WALK☆162Jul 13, 2025Updated 8 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆347Nov 19, 2024Updated last year
- ☆33Jan 23, 2025Updated last year
- ☆218Mar 26, 2024Updated last year
- Tool for viewing NTDS.dit☆197Mar 14, 2025Updated last year
- ☆139Nov 17, 2025Updated 4 months ago
- ☆142Sep 9, 2025Updated 6 months ago
- ☆234Oct 8, 2024Updated last year
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆67Jun 10, 2025Updated 9 months ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- Lockless BOF☆79May 2, 2025Updated 10 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 9 months ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆122Sep 14, 2021Updated 4 years ago
- ☆44Jul 5, 2024Updated last year
- ☆38Apr 15, 2025Updated 11 months ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago