Generate backdoored RSA keys using SETUP
☆235Dec 1, 2025Updated 4 months ago
Alternatives and similar repositories for RSA-Backdoor
Users that are interested in RSA-Backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆59Dec 10, 2025Updated 3 months ago
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆44Aug 2, 2025Updated 8 months ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- ☆38Apr 15, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆215Dec 17, 2025Updated 3 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 3 months ago
- ☆163Jun 12, 2025Updated 9 months ago
- ☆52Mar 30, 2026Updated last week
- ☆86May 15, 2025Updated 10 months ago
- BOF with Synthetic Stackframe☆239Oct 30, 2025Updated 5 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- ☆337Aug 20, 2025Updated 7 months ago
- ☆50Oct 14, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆108Aug 21, 2024Updated last year
- MDE/MDI Defender setup for Ludus☆55Mar 14, 2026Updated 3 weeks ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆325Nov 20, 2025Updated 4 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- Convert your shellcode into an ASCII string☆126Jun 27, 2025Updated 9 months ago
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- Sleep obfuscation☆272Dec 13, 2024Updated last year
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆166Oct 21, 2025Updated 5 months ago
- Stage 0☆168Dec 18, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆196Mar 30, 2026Updated last week
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆112Dec 28, 2025Updated 3 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆134Dec 8, 2025Updated 3 months ago
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated 2 years ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 5 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 5 months ago
- Claude MCP server to perform analysis on ROADrecon data☆50Mar 30, 2025Updated last year
- ☆55May 31, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 3 months ago
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆100Dec 22, 2025Updated 3 months ago
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆327Oct 20, 2025Updated 5 months ago
- COM ViewLogger — new malware keylogging technique☆408Jan 6, 2025Updated last year