sagiol / Terms-of-WhatView external linksLinks
Terms of Use Conditional Access M365 Evilginx Phishlet
☆44Jun 23, 2025Updated 7 months ago
Alternatives and similar repositories for Terms-of-What
Users that are interested in Terms-of-What are comparing it to the libraries listed below
Sorting:
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Adversary Emulation Framework☆129Jul 1, 2025Updated 7 months ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆33Mar 5, 2025Updated 11 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- ☆41Feb 20, 2025Updated 11 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- BOF with Synthetic Stackframe☆220Oct 30, 2025Updated 3 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆184Mar 14, 2025Updated 11 months ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated 11 months ago
- ☆50Jun 4, 2025Updated 8 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated 11 months ago
- TypeLib persistence technique☆139Oct 22, 2024Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Jul 3, 2025Updated 7 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Just another Process Injection using Process Hollowing technique.☆19Sep 18, 2023Updated 2 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆39Jan 12, 2026Updated last month
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated 11 months ago
- A Payload Analysis Framework☆116Oct 9, 2025Updated 4 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆231Feb 12, 2025Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Dec 13, 2024Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆183Jan 17, 2026Updated last month
- A small How-To on creating your own weaponized WSL file☆119Jul 23, 2025Updated 6 months ago
- An example reference design for a proposed BOF PE☆197Jan 23, 2026Updated 3 weeks ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Nov 27, 2024Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 6 months ago
- Collection of red team techniques.☆66Apr 25, 2025Updated 9 months ago
- ☆26Feb 11, 2025Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆99Jul 9, 2025Updated 7 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆188Dec 23, 2025Updated last month
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- rust port of pspy with support for process monitoring over dbus☆35Jan 4, 2026Updated last month
- A Dockerized build pipeline for custom Windows x64 shellcode☆53Dec 12, 2025Updated 2 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆161Apr 16, 2025Updated 10 months ago
- OAuth Device Code Phishing Toolkit☆109Feb 6, 2026Updated last week
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆104Updated this week