Terms of Use Conditional Access M365 Evilginx Phishlet
☆46Jun 23, 2025Updated 10 months ago
Alternatives and similar repositories for Terms-of-What
Users that are interested in Terms-of-What are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆189Mar 14, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Adversary Emulation Framework☆130Jul 1, 2025Updated 10 months ago
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 6 months ago
- ☆26Feb 11, 2025Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 3 years ago
- Execute shellcode via Bluetooth device authentication☆41Feb 19, 2025Updated last year
- ☆41Feb 20, 2025Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆70Mar 17, 2025Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- BOF with Synthetic Stackframe☆244Oct 30, 2025Updated 6 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- A Payload Analysis Framework☆118Oct 9, 2025Updated 7 months ago
- TypeLib persistence technique☆143Oct 22, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆133Updated this week
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆209Feb 16, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆108Feb 25, 2025Updated last year
- ☆50Jun 4, 2025Updated 11 months ago
- ☆34Mar 19, 2025Updated last year
- ☆132Jan 23, 2025Updated last year
- A small How-To on creating your own weaponized WSL file☆126Jul 23, 2025Updated 9 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 5 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆47Jan 10, 2024Updated 2 years ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆237Feb 12, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Collection of red team techniques.☆70Apr 25, 2025Updated last year
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- An example reference design for a proposed BOF PE☆206Jan 23, 2026Updated 3 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆317Mar 31, 2025Updated last year
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆306Jul 31, 2024Updated last year
- Reaping treasures from strings in remote processes memory☆287Feb 8, 2025Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 10 months ago