Windows Shell Link (LNK) Proof of Concept
☆16Jul 19, 2025Updated 9 months ago
Alternatives and similar repositories for DataBlockNTLMLeak
Users that are interested in DataBlockNTLMLeak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆65Mar 7, 2026Updated last month
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 9 months ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆59Oct 10, 2025Updated 6 months ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago
- Rebuild of portspoof in GO with additional features.☆30Apr 7, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 3 months ago
- Dump Kerberos tickets☆46Aug 4, 2025Updated 9 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- PCB design for the initial prototype of OBC hardware, to interface with LaunchPad.☆10Sep 19, 2018Updated 7 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆110Jan 18, 2026Updated 3 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated 11 months ago
- RPC to WebClient startup☆57Aug 19, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- Panoptes Endpoint Detection and Response Solution☆44Mar 7, 2026Updated last month
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 3 months ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆17Apr 3, 2026Updated last month
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- Red Team Coin for crypto-mining operations.☆24Mar 1, 2026Updated 2 months ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated last month
- BlackHat Asia 2025 code and presentations☆17Apr 13, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆57Jul 8, 2025Updated 9 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆132Mar 25, 2025Updated last year
- Open source configurator for the Zuoya GMK87 keyboard. Upload display images, configure RGB lighting, and sync time via USB HID. Inclu…☆21Mar 24, 2026Updated last month
- ☆19Apr 23, 2026Updated last week
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation …☆120Feb 19, 2026Updated 2 months ago
- Implementation of the paper "Hallucination Detection in LLMs Using Spectral Features of Attention Maps"☆15Oct 18, 2025Updated 6 months ago
- How to create a native Android command-line application that loads and uses ART virtual machine☆12May 12, 2025Updated 11 months ago
- Encrypt/Decrypt GPG/MIME emails.☆14Oct 9, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Baseline a Windows System against LOLBAS☆74Feb 2, 2026Updated 3 months ago
- ☆13Nov 24, 2019Updated 6 years ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated 2 months ago
- ☆15Apr 6, 2026Updated 3 weeks ago
- IBM iQuHACK 2024 In-Person Challenge☆14Feb 6, 2024Updated 2 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆18Aug 9, 2024Updated last year
- ☆16Feb 27, 2026Updated 2 months ago