Deserialization payload generator for a variety of .NET formatters
☆177Dec 2, 2025Updated 3 months ago
Alternatives and similar repositories for ysonet
Users that are interested in ysonet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web File Manager☆11Aug 21, 2025Updated 7 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver☆42Mar 13, 2026Updated 2 weeks ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- ☆136Feb 11, 2025Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆80Nov 18, 2024Updated last year
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆67Mar 7, 2026Updated 3 weeks ago
- ☆48Dec 5, 2025Updated 3 months ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 6 months ago
- 一款基于James Forshaw的.NET Remoting反序列化工具升级版在TypeFilterLevel.Low模式无文件payload任意代码执行poc的开发心得☆48Jan 23, 2025Updated last year
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆52May 4, 2025Updated 10 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆80Mar 13, 2026Updated 2 weeks ago
- [ALL IN ONE] Everything that I shared to public about Cloud Security is here.☆61Apr 19, 2025Updated 11 months ago
- 修改Bug后的ParamSpider,方便各位师傅使用☆13Nov 13, 2024Updated last year
- 申明:仅供教学演示,禁用非法、未授权等进行钓鱼,后果自负。☆12May 21, 2024Updated last year
- 基于多种策略, 对已有 JAR 包中的全限定类名进行变换, 无限生成高度相似的虚假类名☆18Jul 30, 2025Updated 7 months ago
- Build sneaky & malicious LNK files.☆161Jul 16, 2025Updated 8 months ago
- Get sql server connection configuration information☆28Aug 26, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 9 months ago
- kerberos in rust for fun and profit☆67Mar 13, 2026Updated 2 weeks ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆360Jan 8, 2026Updated 2 months ago
- .NET deserialization hunter☆89Jul 21, 2024Updated last year
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆358Mar 17, 2026Updated last week
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆339Mar 21, 2026Updated last week
- ☆26Aug 11, 2025Updated 7 months ago
- Source code for the DEF CON 33 CTF Finals.☆26Aug 26, 2025Updated 7 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆41Feb 20, 2025Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- A stager and implant that executes remote Web Assembly☆63Feb 4, 2026Updated last month
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆586Mar 19, 2024Updated 2 years ago
- ☆53Sep 23, 2025Updated 6 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago