Terms of Use Conditional Access M365 Evilginx Phishlet
☆45Jun 23, 2025Updated 9 months ago
Alternatives and similar repositories for Terms-of-What
Users that are interested in Terms-of-What are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆189Mar 14, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- ☆26Feb 11, 2025Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Execute shellcode via Bluetooth device authentication☆41Feb 19, 2025Updated last year
- ☆41Feb 20, 2025Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆68Mar 17, 2025Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- BOF with Synthetic Stackframe☆237Oct 30, 2025Updated 5 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- A Payload Analysis Framework☆116Oct 9, 2025Updated 5 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆111Mar 23, 2026Updated last week
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- TypeLib persistence technique☆142Oct 22, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆105Feb 25, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆50Jun 4, 2025Updated 9 months ago
- ☆34Mar 19, 2025Updated last year
- ☆128Jan 23, 2025Updated last year
- A small How-To on creating your own weaponized WSL file☆124Jul 23, 2025Updated 8 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆45Jan 10, 2024Updated 2 years ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 3 months ago
- Collection of red team techniques.☆69Apr 25, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- An example reference design for a proposed BOF PE☆204Jan 23, 2026Updated 2 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆310Mar 31, 2025Updated 11 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆301Jul 31, 2024Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Mar 2, 2025Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago