☆23Nov 29, 2023Updated 2 years ago
Alternatives and similar repositories for SharpETW-Patch
Users that are interested in SharpETW-Patch are comparing it to the libraries listed below
Sorting:
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 2 weeks ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Vuln-dev environment for LuaJIT☆20Dec 30, 2022Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- Cumulus is web application weakness monitoring, works with just 3 code lines☆40Jan 27, 2023Updated 3 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Nov 26, 2025Updated 3 months ago
- TsTeleport Dynamic Virtual Channel Example Experimentation☆15Feb 2, 2014Updated 12 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- An Adaptive Misuse Detection System☆46Nov 4, 2024Updated last year
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- A simple tool for detecting memory modifications to Windows API.☆23Jan 9, 2025Updated last year
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Dec 7, 2025Updated 2 months ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆28Dec 7, 2025Updated 2 months ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Mar 12, 2023Updated 2 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 2 months ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆89Nov 12, 2021Updated 4 years ago