Generate backdoored RSA keys using SETUP
☆236Dec 1, 2025Updated 5 months ago
Alternatives and similar repositories for RSA-Backdoor
Users that are interested in RSA-Backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆59Dec 10, 2025Updated 5 months ago
- Windows rootkit designed to work with BYOVD exploits☆221Jan 18, 2025Updated last year
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆45Aug 2, 2025Updated 9 months ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- ☆38Apr 15, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆221Dec 17, 2025Updated 5 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 5 months ago
- ☆52Mar 30, 2026Updated last month
- ☆165Jun 12, 2025Updated 11 months ago
- ☆86May 15, 2025Updated last year
- BOF with Synthetic Stackframe☆247Oct 30, 2025Updated 6 months ago
- ☆343Aug 20, 2025Updated 8 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 4 months ago
- ☆50Oct 14, 2025Updated 7 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- H0tmCheck: email checking sin ruido, sin basura, solo resultados.☆18Dec 14, 2025Updated 5 months ago
- ☆109Aug 21, 2024Updated last year
- MDE/MDI Defender setup for Ludus☆57Mar 14, 2026Updated 2 months ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆336Nov 20, 2025Updated 5 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- Convert your shellcode into an ASCII string☆129Jun 27, 2025Updated 10 months ago
- Sleep obfuscation☆276Dec 13, 2024Updated last year
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 11 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Set of PoC to abuse Windows minifilters functionality☆83May 1, 2026Updated 2 weeks ago
- Stage 0☆169Dec 18, 2024Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆142Dec 8, 2025Updated 5 months ago
- Sample Rust Hooking Engine☆34Apr 5, 2024Updated 2 years ago
- Modified version of PEAS client for offensive operations☆51Updated this week
- .NET tool used to enrich RPC telemetry☆102Jan 24, 2026Updated 3 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 6 months ago
- Claude MCP server to perform analysis on ROADrecon data☆50Mar 30, 2025Updated last year
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆128Dec 28, 2025Updated 4 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆54May 31, 2025Updated 11 months ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 5 months ago
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆100Dec 22, 2025Updated 4 months ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- early cascade injection PoC based on Outflanks blog post☆242Nov 7, 2024Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆337May 4, 2026Updated 2 weeks ago