Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
☆257Dec 18, 2025Updated 3 months ago
Alternatives and similar repositories for Tangled
Users that are interested in Tangled are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Dec 24, 2025Updated 3 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆94Jan 2, 2026Updated 3 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Using Chromium-based browsers as a proxy for C2 traffic.☆150Dec 6, 2025Updated 4 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆40Aug 5, 2025Updated 8 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆94Jul 7, 2025Updated 9 months ago
- ☆55May 31, 2025Updated 10 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆81Nov 6, 2025Updated 5 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆126Jan 29, 2026Updated 2 months ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆115Jan 21, 2026Updated 2 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆125Jul 11, 2025Updated 9 months ago
- ☆78Jan 1, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆68Jan 5, 2026Updated 3 months ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆74Dec 26, 2025Updated 3 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆100Jan 10, 2026Updated 3 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆71Mar 8, 2026Updated last month
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 9 months ago
- ☆138Jan 16, 2025Updated last year
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆122Mar 27, 2026Updated 2 weeks ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆33Jun 3, 2025Updated 10 months ago
- Shellcode injection using the Windows Debugging API☆178Jan 4, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specific…☆123Apr 6, 2026Updated last week
- Obex – Blocking unwanted DLLs in user mode☆285Sep 18, 2025Updated 6 months ago
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 2 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆157Feb 14, 2026Updated 2 months ago
- Rust-powered HTTP Request Smuggling Scanner.☆117Updated this week
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆285Updated this week
- ☆86May 15, 2025Updated 10 months ago
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆40Jan 3, 2026Updated 3 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A tool to transform Chromium browsers into a C2 Implant☆573Dec 17, 2025Updated 3 months ago
- ☆26Aug 8, 2021Updated 4 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Filesystem interaction via firebeam virtual machine execution☆52Mar 26, 2026Updated 2 weeks ago
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- Activation Context Hijack☆172Aug 3, 2025Updated 8 months ago
- Serverless AITM Simulation Framework for Entra ID and M365☆228Dec 29, 2025Updated 3 months ago