magisterquis / alpt4atsView external linksLinks
A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024
☆16Sep 12, 2024Updated last year
Alternatives and similar repositories for alpt4ats
Users that are interested in alpt4ats are comparing it to the libraries listed below
Sorting:
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- ☆38Apr 15, 2025Updated 10 months ago
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- A collection of statically-linked tools targeted to run on almost any linux system.☆34Sep 2, 2025Updated 5 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆34Jun 23, 2024Updated last year
- A cross platform Go library to work with Windows Security Descriptors☆40Feb 10, 2026Updated last week
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 8 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 8 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- ☆13Jul 15, 2021Updated 4 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆26Feb 27, 2025Updated 11 months ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated last month
- ☆24Sep 26, 2021Updated 4 years ago
- ☆18Aug 31, 2021Updated 4 years ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- ☆102Sep 5, 2024Updated last year
- ☆200May 29, 2024Updated last year
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- ☆48May 12, 2021Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- ☆24Feb 1, 2025Updated last year
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Microsoft Telnet Server MS-TNAP Authentication Bypass Exploit☆22Apr 28, 2025Updated 9 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 11, 2026Updated last week
- .NET 4.0 Scheduled Job Lateral Movement☆90Aug 25, 2020Updated 5 years ago
- ☆62Feb 10, 2022Updated 4 years ago
- Rust template/library for implementing your own COFF loader☆71Jan 27, 2025Updated last year
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- Bypass LSA protection using the BYODLL technique☆171Sep 21, 2024Updated last year