Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
☆261Dec 18, 2025Updated 4 months ago
Alternatives and similar repositories for Tangled
Users that are interested in Tangled are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Apr 13, 2026Updated 3 weeks ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆96Jan 2, 2026Updated 4 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Using Chromium-based browsers as a proxy for C2 traffic.☆152Dec 6, 2025Updated 4 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆41Aug 5, 2025Updated 9 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 9 months ago
- ☆54May 31, 2025Updated 11 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆83Nov 6, 2025Updated 5 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆128Jan 29, 2026Updated 3 months ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆120Jan 21, 2026Updated 3 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆127Jul 11, 2025Updated 9 months ago
- ☆78Jan 1, 2026Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆69Jan 5, 2026Updated 4 months ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆74Dec 26, 2025Updated 4 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆102Jan 10, 2026Updated 3 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆72Mar 8, 2026Updated last month
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 10 months ago
- ☆139Jan 16, 2025Updated last year
- Shellcode injection using the Windows Debugging API☆178Jan 4, 2026Updated 4 months ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆34Jun 3, 2025Updated 11 months ago
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆125Mar 27, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Obex – Blocking unwanted DLLs in user mode☆283Sep 18, 2025Updated 7 months ago
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 3 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆160Feb 14, 2026Updated 2 months ago
- Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specific…☆132Apr 24, 2026Updated last week
- Rust-powered HTTP Request Smuggling Scanner.☆117Updated this week
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆291Apr 26, 2026Updated last week
- ☆86May 15, 2025Updated 11 months ago
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆40Jan 3, 2026Updated 4 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool to transform Chromium browsers into a C2 Implant☆576Dec 17, 2025Updated 4 months ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- ☆28Aug 8, 2021Updated 4 years ago
- PolyEngine is an evasive PE packer designed for CTF challenges and low-level Windows security education. It focuses on bypassing EDR and …☆104Updated this week
- Filesystem interaction via firebeam virtual machine execution☆52Mar 26, 2026Updated last month
- Enumerate Domain Users Without Authentication☆285Apr 22, 2025Updated last year
- Activation Context Hijack☆172Aug 3, 2025Updated 9 months ago