☆39Mar 31, 2025Updated last year
Alternatives and similar repositories for TeamsCh-Shell
Users that are interested in TeamsCh-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆60Oct 9, 2024Updated last year
- Repository for doing pen300 exercises☆27Oct 21, 2022Updated 3 years ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated last year
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated 3 months ago
- Early Bird APC Injection in Rust☆66Oct 9, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulati…☆85Mar 18, 2026Updated 2 months ago
- 网络安全开源图书三部曲☆19Jan 3, 2026Updated 4 months ago
- Weaponized VSCode Extensions☆17May 7, 2026Updated 2 weeks ago
- Zero-trust encrypted vault with cryptographic plausible deniability. Duress-proof storage for activists, journalists, and whistleblowers.…☆46Mar 21, 2026Updated 2 months ago
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆74Oct 22, 2025Updated 6 months ago
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆62Mar 1, 2026Updated 2 months ago
- 学习笔记☆13Mar 4, 2022Updated 4 years ago
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 8 months ago
- ☆21Oct 15, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Mockingjay process self injection POC☆51Aug 8, 2023Updated 2 years ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆149Jul 2, 2025Updated 10 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆13Oct 31, 2023Updated 2 years ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆337May 4, 2026Updated 2 weeks ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆18Jun 9, 2023Updated 2 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- Mobus write and read applications, standalone.☆10Jun 27, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- sigreturn-oriented(SROP) based sleep obfuscation poc for Linux☆69Dec 15, 2025Updated 5 months ago
- GDB enhanced to debug wine processes☆16Jul 31, 2022Updated 3 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- AI 生成☆49Jul 30, 2025Updated 9 months ago
- Colored Cat is a syntax highlighter file reader.☆15Jun 21, 2024Updated last year
- A VSCode Workspace based hacking environment utils. Starting your Note-Driven Hacking experience.☆111Aug 21, 2025Updated 9 months ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆77Dec 10, 2025Updated 5 months ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Mar 16, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- small operating system☆11Apr 30, 2021Updated 5 years ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆67Nov 14, 2025Updated 6 months ago
- Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.☆13Apr 5, 2025Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆134Oct 10, 2021Updated 4 years ago
- Simultaneously search CVEs and exploits across multiple cybersecurity data sources.☆14Jan 5, 2022Updated 4 years ago
- C# havoc implant☆101Feb 12, 2023Updated 3 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Jun 27, 2023Updated 2 years ago