Signing-key abuse and update exploitation framework
☆131May 18, 2025Updated 10 months ago
Alternatives and similar repositories for sh4d0wup
Users that are interested in sh4d0wup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Authenticate a tarball through a signed tag in a git repository (with reproducible builds)☆17May 28, 2022Updated 3 years ago
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- Bruteforce with a stream of permutations of a specific pattern☆26Aug 6, 2025Updated 7 months ago
- Dependency lockfiles for reproducible build environments 📦🔒☆48Updated this week
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆578Jan 20, 2026Updated 2 months ago
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 2 years ago
- 🥸 Experimental p2p gossip network for OpenPGP signature transparency 🥸☆36Updated this week
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- CNQ3 for Quake III Champions☆12Nov 30, 2023Updated 2 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Rust macro to embed encrypted files in compiled binary☆19Nov 16, 2022Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- Detect EDR's exceptions by inspecting processes' loaded modules☆131Mar 15, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- Manage lockfiles in PKGBUILDs for upstreams that don't ship them, `updpkgsums` for dependency trees (Arch Linux tooling)☆14Mar 13, 2026Updated last week
- ☆19Mar 4, 2023Updated 3 years ago
- A PoC project for embedding shellcode to Hint/Name Table☆114May 16, 2022Updated 3 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated last month
- Calling Objective-C libraries from Rust☆13Sep 4, 2016Updated 9 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆263Jun 29, 2024Updated last year
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆130Sep 27, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆405Nov 26, 2025Updated 4 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆114May 19, 2023Updated 2 years ago
- Experimental script to query rebuilderd for results☆14Dec 4, 2023Updated 2 years ago
- ☆124Oct 9, 2023Updated 2 years ago
- Hide memory artifacts using ROP and hardware breakpoints.☆145Oct 20, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 3 years ago
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆138Mar 3, 2025Updated last year
- Authenticate the cryptographic chain-of-custody of Linux distributions (like Arch Linux and Debian) to their source code inputs☆28Apr 18, 2025Updated 11 months ago
- Red team oriented key finder and correlator☆21Nov 21, 2025Updated 4 months ago
- awesome list of browser exploitation tutorials☆13Sep 21, 2018Updated 7 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago