A C# implementation that disables Windows Firewall bypassing UAC
☆17Oct 23, 2024Updated last year
Alternatives and similar repositories for FirewallMoniker
Users that are interested in FirewallMoniker are comparing it to the libraries listed below
Sorting:
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 3 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 2 months ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- Windows Thread Pool Injection Havoc Implementation☆34Mar 23, 2024Updated last year
- Linux Enumeration / Privilege escalation tool☆26Sep 3, 2020Updated 5 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆79Jul 25, 2025Updated 7 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆147Jul 17, 2025Updated 8 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆90Feb 16, 2026Updated last month
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 7 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆65Mar 19, 2024Updated 2 years ago
- Compile shellcode into an exe file from Windows or Linux.☆71Jun 7, 2025Updated 9 months ago
- I was challenged by a friend to list all the processes and drivers in a system using more "unusual" methods. By doing this I learned quit…☆14Jul 12, 2016Updated 9 years ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆87Apr 26, 2025Updated 10 months ago
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 7 months ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆151Jul 20, 2022Updated 3 years ago
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- A simple and heavily documented series of test hypervisors built for 64-bit Windows 10 systems running under Intel's VT-x☆34Dec 27, 2020Updated 5 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- ntoskrnl .data hooks for UM-KM communication☆54May 26, 2024Updated last year
- A vulnerabilities database for fully-automated audits☆16Jul 20, 2023Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP☆127Mar 14, 2026Updated last week
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Fud Runpe Av Evasion / All Av Bypass☆32Feb 24, 2023Updated 3 years ago
- Find Inbound Email Domains☆34Dec 21, 2023Updated 2 years ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆211Aug 21, 2025Updated 7 months ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago