Zero-dependency MCP server implementation.
☆74Feb 23, 2026Updated last month
Alternatives and similar repositories for zeromcp
Users that are interested in zeromcp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 3 months ago
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 7 months ago
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Oct 30, 2024Updated last year
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆112Mar 25, 2024Updated last year
- A few examples of how to trap virtual memory access on Windows.☆42Dec 18, 2024Updated last year
- ☆12Feb 2, 2025Updated last year
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 6 months ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- ☆139Nov 17, 2025Updated 4 months ago
- ☆50May 12, 2021Updated 4 years ago
- Crystal Palace library for proxying Nt API calls via the Threadpool☆101Oct 18, 2025Updated 5 months ago
- Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specific…☆113Mar 17, 2026Updated last week
- AI 生成☆48Jul 30, 2025Updated 7 months ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- ☆34Aug 7, 2023Updated 2 years ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago
- "Service-less" driver loading☆184Nov 28, 2024Updated last year
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago
- ☆38Apr 15, 2025Updated 11 months ago
- ☆14Dec 24, 2025Updated 3 months ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 3 months ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Sep 20, 2020Updated 5 years ago
- Pure Go port of Hacker Disassembler Engine.☆25Feb 21, 2025Updated last year
- A tool to tunnel TCP traffic over WinRM☆18Jul 15, 2021Updated 4 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆122Sep 8, 2024Updated last year
- ☆53Sep 23, 2025Updated 6 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆119Oct 6, 2025Updated 5 months ago
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- POC for CVE-2025-54918 and a technical demonstration.☆56Jan 12, 2026Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post☆239Nov 7, 2024Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Implementation of sllvm obfuscator☆66Nov 5, 2022Updated 3 years ago
- The code is a pingback to the Dark Vortex blog: https://0xdarkvortex.dev/hiding-memory-allocations-from-mdatp-etwti-stack-tracing/☆210Jan 29, 2023Updated 3 years ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆438Jun 27, 2025Updated 8 months ago