☆39Mar 31, 2025Updated last year
Alternatives and similar repositories for TeamsCh-Shell
Users that are interested in TeamsCh-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository for doing pen300 exercises☆25Oct 21, 2022Updated 3 years ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated last year
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last month
- Early Bird APC Injection in Rust☆64Oct 9, 2024Updated last year
- Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulati…☆85Mar 18, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Weaponized VSCode Extensions☆15Feb 22, 2026Updated last month
- 网络安全开源图书三部曲☆18Jan 3, 2026Updated 3 months ago
- ☆18Oct 15, 2024Updated last year
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Oct 22, 2025Updated 5 months ago
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆62Mar 1, 2026Updated last month
- 学习笔记☆13Mar 4, 2022Updated 4 years ago
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 7 months ago
- Mockingjay process self injection POC☆50Aug 8, 2023Updated 2 years ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆143Jul 2, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆330Oct 20, 2025Updated 5 months ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆17Jun 9, 2023Updated 2 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- sigreturn-oriented(SROP) based sleep obfuscation poc for Linux☆66Dec 15, 2025Updated 3 months ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- AI 生成☆49Jul 30, 2025Updated 8 months ago
- Colored Cat is a syntax highlighter file reader.☆15Jun 21, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A VSCode Workspace based hacking environment utils. Starting your Note-Driven Hacking experience.☆110Aug 21, 2025Updated 7 months ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆76Dec 10, 2025Updated 4 months ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Mar 16, 2022Updated 4 years ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆67Nov 14, 2025Updated 4 months ago
- Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.☆13Apr 5, 2025Updated last year
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆212Jan 6, 2026Updated 3 months ago
- Simultaneously search CVEs and exploits across multiple cybersecurity data sources.☆14Jan 5, 2022Updated 4 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆131Oct 10, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Configuration and Programs for activating IMU data on Emlid Reach☆11Feb 4, 2018Updated 8 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆50Jan 14, 2026Updated 2 months ago
- Python default webserver as an windows executable☆18Jan 20, 2018Updated 8 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆15May 18, 2023Updated 2 years ago