A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and static signature removal.
☆184Mar 15, 2026Updated 3 weeks ago
Alternatives and similar repositories for KaplaStrike
Users that are interested in KaplaStrike are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆189Jan 17, 2026Updated 2 months ago
- dcsync bof☆46Feb 13, 2026Updated last month
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 10 months ago
- find dll base addresses without PEB WALK☆162Jul 13, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 10 months ago
- ☆33Jan 23, 2025Updated last year
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing — no VSS, no Registry APIs, no PowerShell☆74Updated this week
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆122Jan 4, 2026Updated 3 months ago
- ☆55May 31, 2025Updated 10 months ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- TypeLib persistence technique☆142Oct 22, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 9 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- ☆59Updated this week
- Sleep obfuscation☆272Dec 13, 2024Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- ☆100Sep 1, 2024Updated last year
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆117Dec 21, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆138Nov 17, 2025Updated 4 months ago
- ASPX Web Shell with COFF Loader☆126Mar 10, 2026Updated 3 weeks ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆61Mar 27, 2026Updated last week
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated last month
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆154Nov 23, 2025Updated 4 months ago
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 3 months ago
- A BOF to enumerate system process, their protection levels, and more.☆126Nov 27, 2024Updated last year
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆48Nov 9, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- List web account manager (WAM) accounts added to the current profile☆25Dec 11, 2025Updated 3 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆201Jun 17, 2025Updated 9 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆129Aug 19, 2025Updated 7 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆282Sep 18, 2024Updated last year
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆230Sep 19, 2025Updated 6 months ago
- A collection of position independent coding resources☆109Nov 15, 2025Updated 4 months ago