Generate backdoored RSA keys using SETUP
☆235Dec 1, 2025Updated 3 months ago
Alternatives and similar repositories for RSA-Backdoor
Users that are interested in RSA-Backdoor are comparing it to the libraries listed below
Sorting:
- ☆58Dec 10, 2025Updated 3 months ago
- Windows rootkit designed to work with BYOVD exploits☆217Jan 18, 2025Updated last year
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆37Aug 2, 2025Updated 7 months ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆208Dec 17, 2025Updated 3 months ago
- ☆38Apr 15, 2025Updated 11 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 3 months ago
- ☆164Jun 12, 2025Updated 9 months ago
- ☆53Sep 23, 2025Updated 5 months ago
- ☆86May 15, 2025Updated 10 months ago
- BOF with Synthetic Stackframe☆233Oct 30, 2025Updated 4 months ago
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- ☆335Aug 20, 2025Updated 6 months ago
- MDE/MDI Defender setup for Ludus☆49Mar 5, 2026Updated last week
- ☆50Oct 14, 2025Updated 5 months ago
- ☆108Aug 21, 2024Updated last year
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆318Nov 20, 2025Updated 3 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- Convert your shellcode into an ASCII string☆127Jun 27, 2025Updated 8 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆132Dec 8, 2025Updated 3 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- Sleep obfuscation☆270Dec 13, 2024Updated last year
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆181Feb 26, 2026Updated 2 weeks ago
- Stage 0☆169Dec 18, 2024Updated last year
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated last year
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago
- Claude MCP server to perform analysis on ROADrecon data☆49Mar 30, 2025Updated 11 months ago
- ☆55May 31, 2025Updated 9 months ago
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆99Dec 22, 2025Updated 2 months ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 3 months ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆55Updated this week
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆326Oct 20, 2025Updated 4 months ago
- early cascade injection PoC based on Outflanks blog post☆239Nov 7, 2024Updated last year