A C and Go /proc/pid/maps cloak of invisibilty for shared object files
☆21Nov 19, 2025Updated 5 months ago
Alternatives and similar repositories for sneaky_remap
Users that are interested in sneaky_remap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Updated this week
- H-E-B Curbside availability finder☆10Feb 6, 2021Updated 5 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 3 months ago
- ☆16Jan 9, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆48Oct 4, 2025Updated 6 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- SCEP request tool for AD CS and Intune☆76Oct 24, 2025Updated 6 months ago
- ☆12May 13, 2024Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Parse SDDL strings☆37Apr 1, 2024Updated 2 years ago
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆18Oct 13, 2025Updated 6 months ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆107Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- KittyLoader is a highly evasive loader written in C / Assembly☆262Sep 22, 2025Updated 7 months ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 5 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆294Mar 29, 2026Updated 3 weeks ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆25Jul 5, 2023Updated 2 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 9 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆62Jun 9, 2025Updated 10 months ago
- Minimal workflows☆21Mar 19, 2024Updated 2 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated 2 years ago
- A hoontr must hoont☆107Nov 27, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Fairy Law - Compromise or disable EDR security solutions☆71Dec 1, 2025Updated 4 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- A Rust template for writing Beacon Object Files (BOFs)☆126Feb 11, 2026Updated 2 months ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 5 months ago
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆267Sep 23, 2025Updated 7 months ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 8 years ago
- Trusted Computing Software Stack open source implementation☆27May 17, 2012Updated 13 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 3 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆37Nov 8, 2024Updated last year
- eBPF-https is an open source web application firewall (WAF)☆15Sep 11, 2024Updated last year
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆210Apr 20, 2026Updated last week
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆109Sep 4, 2025Updated 7 months ago
- ☆31Jul 26, 2024Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 5 months ago