The RedStack DB extracted as an Obsidian Vault
☆40Dec 25, 2025Updated 2 months ago
Alternatives and similar repositories for redstack-vault
Users that are interested in redstack-vault are comparing it to the libraries listed below
Sorting:
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 7 months ago
- Rainbow table generation & lookup tools.☆31Dec 17, 2025Updated 2 months ago
- Register various user actions - keystrokes on the computer keyboard, movements and mouse keystrokes☆25Dec 26, 2024Updated last year
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 2 weeks ago
- Reflective DLL self-loading as a library☆21May 3, 2025Updated 10 months ago
- ☆29Jun 4, 2024Updated last year
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- A simple, 100% Rust implementation of a vector storage database with on disk persistency.☆32Jul 5, 2024Updated last year
- ☆31Feb 28, 2025Updated last year
- ☆32Jun 1, 2024Updated last year
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Sep 3, 2025Updated 6 months ago
- Sporta is a dynamic app designed for sports enthusiasts who want to connect 🤝, compete 🏆, and play 🏀🎾⚽ with others.☆10Apr 24, 2025Updated 10 months ago
- Payload Obfuscation for Red Teams workshop materials☆81Nov 25, 2025Updated 3 months ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- DeepLocker - Deep learning based malware☆35Nov 7, 2018Updated 7 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆44Oct 11, 2025Updated 4 months ago
- This contains 100 days of the notes which i have learned with the internship.☆18Dec 1, 2024Updated last year
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- A low-cost remote vital signs monitor for home patients☆12Feb 19, 2026Updated 2 weeks ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated 2 months ago
- ☆11Oct 13, 2025Updated 4 months ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- Crystal Palace library for proxying Nt API calls via the Threadpool☆100Oct 18, 2025Updated 4 months ago
- ☆45Jan 1, 2023Updated 3 years ago
- ☆18Nov 19, 2025Updated 3 months ago
- My mpv.net configuration files☆12Jul 10, 2022Updated 3 years ago
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆87Updated this week
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 7 months ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- ☆12Feb 15, 2022Updated 4 years ago
- A very simple app to make formatted flashcards from Google Sheets☆10Jul 25, 2018Updated 7 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year