An open-source, C#-based remote administration tool (RAT), enabling complete control of a remote Windows machine, designed for legitimate remote administration and security testing of Windows systems.
☆185May 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for DuplexSpyCS
Users that are interested in DuplexSpyCS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- UDC2 implementation that provides an ICMP C2 channel☆124Nov 24, 2025Updated 5 months ago
- A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.☆153Apr 15, 2026Updated last month
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆142Dec 8, 2025Updated 5 months ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆111Apr 16, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- A BOF that's a BOF Loader and more☆205Apr 6, 2026Updated last month
- Stealthy .NET assembly loading using AssemblyNative::LoadFromBuffer☆59Mar 22, 2026Updated 2 months ago
- [WIP] A Modern Rust Remote Administration Tool for Windows.☆64Nov 7, 2025Updated 6 months ago
- bypass edr杀软的dumplsass工具☆21Mar 21, 2025Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆169Jun 19, 2025Updated 11 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 3 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆133Feb 17, 2026Updated 3 months ago
- ☆164May 5, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Open-source multi-purpose remote access tool for Microsoft Windows☆206Mar 11, 2026Updated 2 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆168Nov 2, 2025Updated 6 months ago
- A guide to modern exploit development, shellcode, EDR and WAF bypass, and initial Red Team access.☆29Mar 6, 2026Updated 2 months ago
- find dll base addresses without PEB WALK☆163Jul 13, 2025Updated 10 months ago
- ☆17Jun 16, 2025Updated 11 months ago
- HVNC PoC (Hidden VNC) in Rust☆41Sep 2, 2025Updated 8 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆154Apr 18, 2025Updated last year
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆175May 8, 2026Updated 2 weeks ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 针对finereportv10反序列化接口/webroot/decision/remote/design/channel进行无回显检测并提供Godzilla memshell注入功能(部分环境缺少依赖无法成功)☆23Oct 17, 2023Updated 2 years ago
- ASPX Web Shell with COFF Loader☆130Mar 10, 2026Updated 2 months ago
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆99Oct 17, 2025Updated 7 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 8 months ago
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 6 months ago
- ☆54May 31, 2025Updated 11 months ago
- Vectored Exception Handling Squared☆30Dec 27, 2025Updated 4 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆286Apr 6, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Just another EDR killer☆137Jan 21, 2026Updated 4 months ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆112Apr 8, 2024Updated 2 years ago
- A tool to play with scheduled tasks on Windows, in Rust☆123Nov 1, 2025Updated 6 months ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆139Apr 6, 2026Updated last month
- This C# tool sprays for admin access over the entire domain☆91Dec 7, 2025Updated 5 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆104Jul 9, 2025Updated 10 months ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 8 months ago