General Purpose OpSec Server
☆113Mar 13, 2026Updated 3 weeks ago
Alternatives and similar repositories for Dispatch
Users that are interested in Dispatch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- ☆48Dec 5, 2025Updated 4 months ago
- ☆138Jan 16, 2025Updated last year
- Request device ticket/token using the device's MSA☆37Aug 25, 2025Updated 7 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated 10 months ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 7 months ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- ForsHops☆153Mar 25, 2025Updated last year
- load shellcode without P/D Invoke and VirtualProtect call.☆169Sep 2, 2025Updated 7 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 9 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆312Mar 31, 2025Updated last year
- ☆126Dec 12, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- UDC2 implementation that provides an ICMP C2 channel☆120Nov 24, 2025Updated 4 months ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆425Sep 29, 2025Updated 6 months ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆273Jun 18, 2025Updated 9 months ago
- SCEP request tool for AD CS and Intune☆75Oct 24, 2025Updated 5 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 8 months ago
- Payload Generation Workflow☆41Jul 18, 2025Updated 8 months ago
- One-header configurable C++20 COFF loader☆19Jul 21, 2025Updated 8 months ago
- ☆234Oct 8, 2024Updated last year
- A PoC for Early Cascade process injection technique.☆215Jan 30, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆404Aug 18, 2025Updated 7 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆114Mar 30, 2026Updated last week
- ☆16May 30, 2025Updated 10 months ago
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 5 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 10 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆61Apr 13, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Stealthily inject shellcode into an executable☆459Oct 19, 2025Updated 5 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- A Mythic agent for Windows written in C☆161Mar 25, 2026Updated 2 weeks ago
- Lateral movement with DCOM DLL hijacking☆175Jul 4, 2025Updated 9 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 3 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆79Oct 27, 2025Updated 5 months ago