A safe place to hide all your precious data at.
☆24Feb 27, 2025Updated last year
Alternatives and similar repositories for VolatileVault
Users that are interested in VolatileVault are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Run Cobalt Strike BOFs in Brute Ratel C4!☆86Apr 15, 2025Updated 11 months ago
- Framework for modeling and researching C2 communications for developing efficient filtering and detection logic☆23Oct 24, 2024Updated last year
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Sep 15, 2023Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆47Sep 18, 2025Updated 6 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆281Apr 17, 2023Updated 2 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated last month
- C# wrapper for ligolo☆16Dec 9, 2021Updated 4 years ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆169Nov 17, 2025Updated 4 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆29Dec 7, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Sep 24, 2022Updated 3 years ago
- ☆13Aug 13, 2021Updated 4 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆14Nov 30, 2021Updated 4 years ago
- ☆29Mar 2, 2023Updated 3 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Jailbreak detection bypass for the iOSSecuritySuite Swift library☆17Feb 18, 2024Updated 2 years ago
- Minimal AXIS2 webshell☆13Sep 7, 2014Updated 11 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Jun 8, 2020Updated 5 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆48Jan 30, 2024Updated 2 years ago
- Example of RESTful API service that's consume data from MS-SQL database.☆11Mar 23, 2017Updated 9 years ago
- Bluetooth Landscape Exploration & Enumeration Platform☆53Mar 4, 2026Updated last month
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆26Mar 19, 2025Updated last year
- PowerShell module providing utility commands to manipulate a APK file on Windows☆16Apr 14, 2025Updated 11 months ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Jun 14, 2024Updated last year
- Subdomain Scanner - the most exhaustive tool for sub-domain recognition and mapping to related IPs and ASNs☆18Jul 4, 2025Updated 9 months ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Dec 7, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- LiteSpeed Cache Privilege Escalation PoC☆21Aug 25, 2024Updated last year
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Test bench lab for Shellcode Obfuscation☆36Sep 2, 2025Updated 7 months ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆26Mar 20, 2025Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- A simple way to exfiltrate data using spotify API☆19Updated this week