Bitpixie exploitation PoC
☆98Oct 28, 2025Updated 4 months ago
Alternatives and similar repositories for bitpixie
Users that are interested in bitpixie are comparing it to the libraries listed below
Sorting:
- bitpixie Proof of Concept - Bitlocker Decryptor☆135Sep 21, 2025Updated 5 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆77Sep 8, 2025Updated 6 months ago
- ☆38Jan 7, 2025Updated last year
- Python passive host discovery script☆11Mar 30, 2025Updated 11 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- A list of public attacks on BitLocker☆417Aug 9, 2025Updated 7 months ago
- Compile SharpHound and others on Linux☆24Aug 16, 2024Updated last year
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 7 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆314Feb 16, 2026Updated last month
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆65Jan 10, 2025Updated last year
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 11 months ago
- ☆18Updated this week
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 6 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- ☆31Dec 5, 2024Updated last year
- ☆41Mar 12, 2025Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆77Nov 11, 2024Updated last year
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆31Jan 11, 2026Updated 2 months ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- Fuzzer for fastboot commands☆23Sep 14, 2023Updated 2 years ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 3 months ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Generate and Manage KeyCredentialLinks☆253Mar 9, 2026Updated last week
- ☆155Dec 14, 2023Updated 2 years ago
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 8 months ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- Panoptes Endpoint Detection and Response Solution☆43Mar 7, 2026Updated 2 weeks ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated 2 months ago
- ☆36Nov 4, 2017Updated 8 years ago
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated last year
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Automatically run and populate a new instance of BH CE☆120Jan 30, 2026Updated last month
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year