Explore and filter your GitHub starred repositories
☆25Dec 5, 2023Updated 2 years ago
Alternatives and similar repositories for HubbleHub
Users that are interested in HubbleHub are comparing it to the libraries listed below
Sorting:
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆61Feb 26, 2025Updated last year
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- Your syscall factory☆126Jan 13, 2026Updated last month
- Powershell and python utilties for Entra Connect☆28Jun 5, 2025Updated 8 months ago
- ☆51Jun 28, 2025Updated 8 months ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- ☆36Oct 26, 2023Updated 2 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- bash poc scripts to exploit open fpm ports☆59Jul 31, 2019Updated 6 years ago
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 8 months ago
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Aug 23, 2025Updated 6 months ago
- Spawn SYSTEM shells like a PRO!☆10Mar 8, 2023Updated 2 years ago
- A library for quickly and easily encrypting strings and text file content.☆12Jul 1, 2021Updated 4 years ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13May 27, 2023Updated 2 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- ☆10Jun 26, 2024Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Jun 10, 2024Updated last year
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆52May 8, 2024Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆197Nov 4, 2025Updated 3 months ago
- Some Cyber Security related scripts☆18Jul 18, 2023Updated 2 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆129Sep 27, 2023Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆65Dec 16, 2023Updated 2 years ago
- ☆58Jun 2, 2025Updated 9 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Halos Gate-based NTAPI Unhooker☆52Apr 21, 2022Updated 3 years ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆40Oct 8, 2024Updated last year
- ☆12Feb 19, 2026Updated last week
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆334Mar 6, 2025Updated 11 months ago
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated last year
- ☆108Aug 21, 2024Updated last year