Windows Analysis and Research Toolkit
☆239Apr 10, 2026Updated this week
Alternatives and similar repositories for NtWarden
Users that are interested in NtWarden are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated last month
- A New Exploitation Technique for Visual Studio Projects☆12Nov 5, 2023Updated 2 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆29Jul 21, 2025Updated 8 months ago
- ☆127Dec 12, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- BOF to steal Teams cookies☆129Nov 2, 2025Updated 5 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated 11 months ago
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆249Oct 30, 2025Updated 5 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆40Aug 5, 2025Updated 8 months ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆65Mar 8, 2023Updated 3 years ago
- A PoC for Early Cascade process injection technique.☆215Jan 30, 2025Updated last year
- ☆37Mar 18, 2026Updated 3 weeks ago
- Things i do because i saw it on twitter on a weekend☆58Jul 20, 2025Updated 8 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆62Dec 7, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆58Jan 17, 2026Updated 2 months ago
- ☆38Dec 4, 2025Updated 4 months ago
- Deobfuscation and Analysis of Ring-1.io☆84Feb 7, 2026Updated 2 months ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- # Keylogger-BOF☆45Mar 13, 2026Updated last month
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆202Feb 11, 2026Updated 2 months ago
- A different approach to writing BOFs in rust.☆20Aug 20, 2025Updated 7 months ago
- A Rust template for writing Beacon Object Files (BOFs)☆119Feb 11, 2026Updated 2 months ago
- A cyber security toolkit blending manual testing with AI Agents☆121Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Simple Secure Static (HTTPS) File Server with embedded certificate☆48Apr 9, 2023Updated 3 years ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 10 months ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 6 months ago
- Apex Legends external cheat all in one (ud)☆12Jan 24, 2024Updated 2 years ago
- Find jmp gadgets for call stack spoofing.☆79Oct 1, 2025Updated 6 months ago
- ☆12Oct 10, 2024Updated last year
- Dns amplification attack☆24Mar 22, 2019Updated 7 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- windows inlinehook R3 R0☆11Apr 11, 2018Updated 8 years ago
- ☆12Apr 5, 2025Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆183May 19, 2025Updated 10 months ago
- Various Write Ups from OverTheWire, TryHackMe, HackTheBox, CrackMes.one and more!☆12Dec 25, 2022Updated 3 years ago
- A Windows Named Pipe Multi-tool / Proxy☆316Dec 7, 2025Updated 4 months ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆34Oct 3, 2025Updated 6 months ago