Generate backdoored RSA keys using SETUP
☆236Dec 1, 2025Updated 4 months ago
Alternatives and similar repositories for RSA-Backdoor
Users that are interested in RSA-Backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆59Dec 10, 2025Updated 4 months ago
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆45Aug 2, 2025Updated 8 months ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- ☆38Apr 15, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆218Dec 17, 2025Updated 4 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 4 months ago
- ☆52Mar 30, 2026Updated 3 weeks ago
- ☆165Jun 12, 2025Updated 10 months ago
- ☆86May 15, 2025Updated 11 months ago
- BOF with Synthetic Stackframe☆244Oct 30, 2025Updated 5 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- ☆342Aug 20, 2025Updated 8 months ago
- ☆50Oct 14, 2025Updated 6 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- H0tmCheck: email checking sin ruido, sin basura, solo resultados.☆18Dec 14, 2025Updated 4 months ago
- ☆108Aug 21, 2024Updated last year
- MDE/MDI Defender setup for Ludus☆55Mar 14, 2026Updated last month
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆329Nov 20, 2025Updated 5 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 10 months ago
- Sleep obfuscation☆273Dec 13, 2024Updated last year
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Stage 0☆169Dec 18, 2024Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆140Dec 8, 2025Updated 4 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆113Dec 28, 2025Updated 4 months ago
- Sample Rust Hooking Engine☆34Apr 5, 2024Updated 2 years ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 5 months ago
- .NET tool used to enrich RPC telemetry☆102Jan 24, 2026Updated 3 months ago
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆210Apr 20, 2026Updated last week
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 5 months ago
- Claude MCP server to perform analysis on ROADrecon data☆50Mar 30, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆54May 31, 2025Updated 10 months ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 4 months ago
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆99Dec 22, 2025Updated 4 months ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆329Oct 20, 2025Updated 6 months ago