C++ Reflective Assembly Loader
☆33Mar 7, 2025Updated last year
Alternatives and similar repositories for Cpp-ExecAssembly
Users that are interested in Cpp-ExecAssembly are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 9 months ago
- Lateral movement with DCOM DLL hijacking☆178Jul 4, 2025Updated 10 months ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Compile SharpHound and others on Linux☆24Aug 16, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- shell code example☆69Dec 12, 2025Updated 5 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆97Jul 15, 2025Updated 10 months ago
- ☆16Jul 20, 2025Updated 10 months ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆19Aug 4, 2024Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆386Oct 14, 2025Updated 7 months ago
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Feb 27, 2026Updated 2 months ago
- Lsass dumper evading (all ?) EDR detection☆56Nov 10, 2025Updated 6 months ago
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆66Mar 1, 2025Updated last year
- A C++/Asm template for PIC/EXE/DLL malware☆25Aug 12, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Active Directory Mindmap Recipes: A Compromise à la Carte☆154Sep 4, 2025Updated 8 months ago
- Malicious powershell scripts loader designed to avoid detection.☆59Jun 16, 2023Updated 2 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆21Jan 1, 2025Updated last year
- GLPI vulnerabilities checking tool☆168Updated this week
- Commandline spoofing on Windows☆101Nov 25, 2025Updated 5 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆127Jul 11, 2025Updated 10 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆107Feb 25, 2025Updated last year
- ForsHops☆154Mar 25, 2025Updated last year
- A PoC for Early Cascade process injection technique.☆216Jan 30, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Parses Snaffler output file and generate beautified outputs.☆144Jan 4, 2026Updated 4 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆13Apr 24, 2026Updated 3 weeks ago
- NTLM HTTP relay tool with SOCKS proxy for browser session hijacking☆158Apr 6, 2026Updated last month
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆54Jan 16, 2026Updated 4 months ago
- ☆103Oct 7, 2023Updated 2 years ago
- Continuous password spraying tool☆210Mar 12, 2026Updated 2 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆262Jun 10, 2025Updated 11 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 9 months ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆355Apr 28, 2026Updated 3 weeks ago