Terms of Use Conditional Access M365 Evilginx Phishlet
☆44Jun 23, 2025Updated 8 months ago
Alternatives and similar repositories for Terms-of-What
Users that are interested in Terms-of-What are comparing it to the libraries listed below
Sorting:
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- ☆41Feb 20, 2025Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- BOF with Synthetic Stackframe☆230Oct 30, 2025Updated 4 months ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- ☆50Jun 4, 2025Updated 9 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆186Mar 14, 2025Updated 11 months ago
- TypeLib persistence technique☆140Oct 22, 2024Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆103Feb 25, 2025Updated last year
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Updated this week
- A Payload Analysis Framework☆117Oct 9, 2025Updated 5 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆382Dec 13, 2024Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆188Jan 17, 2026Updated last month
- A small How-To on creating your own weaponized WSL file☆122Jul 23, 2025Updated 7 months ago
- An example reference design for a proposed BOF PE☆201Jan 23, 2026Updated last month
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- ☆26Feb 11, 2025Updated last year
- Collection of red team techniques.☆68Apr 25, 2025Updated 10 months ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 7 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆102Jul 9, 2025Updated 8 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆191Feb 16, 2026Updated 3 weeks ago
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 2 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆160Apr 16, 2025Updated 10 months ago
- ☆33Mar 19, 2025Updated 11 months ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated last month