Windows Shell Link (LNK) Proof of Concept
☆16Jul 19, 2025Updated 8 months ago
Alternatives and similar repositories for DataBlockNTLMLeak
Users that are interested in DataBlockNTLMLeak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆57Mar 7, 2026Updated 2 weeks ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆59Oct 10, 2025Updated 5 months ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Rebuild of portspoof in GO with additional features.☆29Oct 24, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated 2 months ago
- Dump Kerberos tickets☆45Aug 4, 2025Updated 7 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Panoptes Endpoint Detection and Response Solution☆44Mar 7, 2026Updated 2 weeks ago
- PCB design for the initial prototype of OBC hardware, to interface with LaunchPad.☆10Sep 19, 2018Updated 7 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆111Jan 18, 2026Updated 2 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- RPC to WebClient startup☆57Aug 19, 2025Updated 7 months ago
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation …☆92Feb 19, 2026Updated last month
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated last month
- Public exploits☆16May 28, 2018Updated 7 years ago
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆15Mar 10, 2026Updated 2 weeks ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 11 months ago
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated 3 weeks ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Feb 26, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- ☆53Jul 8, 2025Updated 8 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Mar 25, 2025Updated last year
- ☆18Updated this week
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Baseline a Windows System against LOLBAS☆73Feb 2, 2026Updated last month
- How to create a native Android command-line application that loads and uses ART virtual machine☆12May 12, 2025Updated 10 months ago
- Encrypt/Decrypt GPG/MIME emails.☆14Oct 9, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Nov 24, 2019Updated 6 years ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last month
- ☆15Oct 1, 2024Updated last year
- Autonomous AI-powered security scanning platform — CLI scanner, web dashboard, and one-command Docker deployment☆32Updated this week
- IBM iQuHACK 2024 In-Person Challenge☆13Feb 6, 2024Updated 2 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- ☆16Feb 27, 2026Updated 3 weeks ago