A C and Go /proc/pid/maps cloak of invisibilty for shared object files
☆21Nov 19, 2025Updated 3 months ago
Alternatives and similar repositories for sneaky_remap
Users that are interested in sneaky_remap are comparing it to the libraries listed below
Sorting:
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆47Oct 4, 2025Updated 4 months ago
- SCEP request tool for AD CS and Intune☆73Oct 24, 2025Updated 4 months ago
- ☆11May 13, 2024Updated last year
- ☆17Jan 9, 2025Updated last year
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- A portable C# utility for enumerating local and remote windows sessions☆55Jan 1, 2026Updated last month
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Feb 13, 2025Updated last year
- Parse SDDL strings☆37Apr 1, 2024Updated last year
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 weeks ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 3 months ago
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆17Oct 13, 2025Updated 4 months ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 3 months ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆37Nov 22, 2025Updated 3 months ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- KittyLoader is a highly evasive loader written in C / Assembly☆257Sep 22, 2025Updated 5 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆280Jan 12, 2026Updated last month
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 7 months ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆48Updated this week
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 5 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆54Sep 24, 2025Updated 5 months ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- ☆31Jul 26, 2024Updated last year
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- ☆36Nov 8, 2024Updated last year
- ☆60Jan 1, 2026Updated last month
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 2 months ago
- ☆26Apr 1, 2022Updated 3 years ago
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 3 months ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆132Sep 4, 2025Updated 5 months ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 10 months ago
- Learn MongoDB from absolute basics.☆52Jan 16, 2026Updated last month
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 2 months ago
- macOS dylib stager☆36Jan 22, 2025Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated 3 weeks ago