Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
☆247Dec 18, 2025Updated 3 months ago
Alternatives and similar repositories for Tangled
Users that are interested in Tangled are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆43Dec 24, 2025Updated 2 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆91Jan 2, 2026Updated 2 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆159Jan 3, 2026Updated 2 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆147Dec 6, 2025Updated 3 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 7 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 8 months ago
- ☆55May 31, 2025Updated 9 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆81Nov 6, 2025Updated 4 months ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆110Jan 21, 2026Updated 2 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆121Jan 29, 2026Updated last month
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆125Jul 11, 2025Updated 8 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆66Jan 5, 2026Updated 2 months ago
- ☆76Jan 1, 2026Updated 2 months ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆72Dec 26, 2025Updated 2 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated 2 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆69Mar 8, 2026Updated 2 weeks ago
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 9 months ago
- ☆139Jan 16, 2025Updated last year
- A stager and implant that executes remote Web Assembly☆60Feb 4, 2026Updated last month
- Shellcode injection using the Windows Debugging API☆171Jan 4, 2026Updated 2 months ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆33Jun 3, 2025Updated 9 months ago
- Obex – Blocking unwanted DLLs in user mode☆283Sep 18, 2025Updated 6 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆147Feb 14, 2026Updated last month
- Collection of BOFs created for red team/adversary emulation engagements. Created to be small and interchangeable, for quick recon or even…☆265Mar 11, 2026Updated last week
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆40Jan 3, 2026Updated 2 months ago
- ☆86May 15, 2025Updated 10 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- ☆27Aug 8, 2021Updated 4 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Filesystem interaction via firebeam virtual machine execution☆42Mar 14, 2026Updated last week
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- Serverless AITM Simulation Framework for Entra ID and M365