A C# implementation that disables Windows Firewall bypassing UAC
☆17Oct 23, 2024Updated last year
Alternatives and similar repositories for FirewallMoniker
Users that are interested in FirewallMoniker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- sigreturn-oriented(SROP) based sleep obfuscation poc for Linux☆66Dec 15, 2025Updated 3 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆68Dec 25, 2025Updated 3 months ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- Windows Thread Pool Injection Havoc Implementation☆34Mar 23, 2024Updated 2 years ago
- Linux Enumeration / Privilege escalation tool☆26Sep 3, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 7 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆80Jul 25, 2025Updated 8 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆148Jul 17, 2025Updated 8 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆92Feb 16, 2026Updated last month
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 7 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- Compile shellcode into an exe file from Windows or Linux.☆73Jun 7, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- I was challenged by a friend to list all the processes and drivers in a system using more "unusual" methods. By doing this I learned quit…☆14Jul 12, 2016Updated 9 years ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆87Apr 26, 2025Updated 11 months ago
- SAM Dumping in C#☆56Nov 27, 2025Updated 4 months ago
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆153Jul 20, 2022Updated 3 years ago
- Azure apim mini proxy☆55Feb 16, 2026Updated last month
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A simple and heavily documented series of test hypervisors built for 64-bit Windows 10 systems running under Intel's VT-x☆35Dec 27, 2020Updated 5 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- ntoskrnl .data hooks for UM-KM communication☆53May 26, 2024Updated last year
- A vulnerabilities database for fully-automated audits☆16Jul 20, 2023Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP☆128Apr 2, 2026Updated last week
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Fud Runpe Av Evasion / All Av Bypass☆31Feb 24, 2023Updated 3 years ago
- Find Inbound Email Domains☆34Dec 21, 2023Updated 2 years ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 9 months ago
- An example of COM hijacking using a proxy DLL.☆43Aug 17, 2021Updated 4 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆215Aug 21, 2025Updated 7 months ago