Malicious shortcut file builder for spear-phishing and red-team engagement.
☆18Sep 11, 2023Updated 2 years ago
Alternatives and similar repositories for lnk-builder
Users that are interested in lnk-builder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 3 years ago
- ☆20Feb 27, 2022Updated 4 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Feb 13, 2023Updated 3 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆24Apr 12, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Hessian UTF-8 Overlong Encoding☆21Mar 9, 2024Updated 2 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated last week
- ☆51Aug 28, 2021Updated 4 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Jan 12, 2023Updated 3 years ago
- Introducing a powerful solution that converts any non-XP-compatible 32-bit exe or dll into a Windows XP-friendly binary. Our patch files …☆28Apr 3, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- exploit for dirtycow☆14Dec 21, 2022Updated 3 years ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 9 months ago
- 基于 Agent + Instrumentation + ASM 的 Java 进程内存马检测与清除查杀工具(含 GUI)+CLI命令行操作功能☆39Oct 27, 2025Updated 5 months ago
- A red teaming attack paradigm against AI Agents☆33Mar 9, 2025Updated last year
- Common library used by SharpHound.☆101Updated this week
- BYOVD collection☆24Mar 20, 2024Updated 2 years ago
- Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)☆10Feb 7, 2017Updated 9 years ago
- ☆35Jan 23, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- Parses Cobalt Strike malleable C2 profiles.☆61Updated this week
- dlopen() filelessly a shared object or even a program (and run it).☆57Aug 31, 2023Updated 2 years ago
- Go package for fexecve(3) and execveat(2)☆15Mar 4, 2026Updated last month
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- Yet Another Extension for Proxy and Yakit☆29Apr 14, 2025Updated last year
- Linux Shared Library to Shellcode Loader☆90Feb 15, 2026Updated 2 months ago
- Spawn SYSTEM shells like a PRO!☆10Mar 8, 2023Updated 3 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 2 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- ☆16Jun 22, 2022Updated 3 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆29Dec 4, 2020Updated 5 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆136Oct 8, 2021Updated 4 years ago
- The best powershell obfuscator ever made☆130Aug 1, 2025Updated 8 months ago