Playing with packets in C#
☆15Aug 16, 2024Updated last year
Alternatives and similar repositories for PacketAlchemy
Users that are interested in PacketAlchemy are comparing it to the libraries listed below
Sorting:
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆190Mar 4, 2024Updated 2 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- Position-independent Reflective Loader for macOS☆120Feb 19, 2026Updated last month
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 3 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Aug 15, 2024Updated last year
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Apr 7, 2024Updated last year
- ☆133Dec 4, 2023Updated 2 years ago
- Open Source C&C Specification☆278Feb 28, 2025Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Beacon Object File (BOF) Template☆66Mar 9, 2026Updated last week
- ☆100Sep 1, 2024Updated last year
- A library for interacting with Windows through SMB written in Nim.☆17Sep 14, 2025Updated 6 months ago
- Youtube channel sample code☆55Mar 14, 2026Updated last week
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Oct 2, 2022Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- ☆126Sep 1, 2024Updated last year
- Simple BOF to read the protection level of a process☆119May 10, 2023Updated 2 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- WinRAR 0day CVE-2025-8088 PoC RAR Archive☆46Aug 12, 2025Updated 7 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- Use Rust to implement some Red Team techniques :)☆13Nov 11, 2024Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆147Aug 15, 2024Updated last year
- string encryption in Nim☆19Jun 15, 2024Updated last year
- My personal shellcode loader☆32Mar 9, 2023Updated 3 years ago
- ☆20Nov 6, 2023Updated 2 years ago
- MASM Crypto Lib☆16Sep 27, 2015Updated 10 years ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- ☆31Feb 28, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago