Explore and filter your GitHub starred repositories
☆25Dec 5, 2023Updated 2 years ago
Alternatives and similar repositories for HubbleHub
Users that are interested in HubbleHub are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆61Feb 26, 2025Updated last year
- Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP☆127Updated this week
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- Spawn SYSTEM shells like a PRO!☆10Mar 8, 2023Updated 3 years ago
- A library for quickly and easily encrypting strings and text file content.☆12Jul 1, 2021Updated 4 years ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Some Cyber Security related scripts☆18Jul 18, 2023Updated 2 years ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆40Oct 8, 2024Updated last year
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- ☆53Jun 28, 2025Updated 8 months ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- AI-based implant feature☆25Apr 28, 2025Updated 10 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- Activation Context Hijack☆172Aug 3, 2025Updated 7 months ago
- ☆36Oct 26, 2023Updated 2 years ago
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 8 months ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 7 months ago
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- Persist like a Dodder☆68May 19, 2025Updated 10 months ago
- ☆60Jun 2, 2025Updated 9 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- Extract the Procedures (TTP) from CTI reports☆17Dec 13, 2025Updated 3 months ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆117Oct 20, 2024Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- Lnk crafting and research tools☆147Mar 4, 2026Updated 2 weeks ago