NTLM HTTP relay tool with SOCKS proxy for browser session hijacking
☆108Apr 6, 2026Updated this week
Alternatives and similar repositories for ghostsurf
Users that are interested in ghostsurf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆83Updated this week
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- Internal Monologue BOF☆78Dec 28, 2024Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- The command prompt has been disabled by your administrator☆42May 18, 2023Updated 2 years ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆396Sep 26, 2025Updated 6 months ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 7 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14Dec 5, 2025Updated 4 months ago
- ☆200Mar 28, 2025Updated last year
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Mar 17, 2026Updated 3 weeks ago
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- macOS dylib stager☆36Jan 22, 2025Updated last year
- Generate and Manage KeyCredentialLinks☆253Mar 9, 2026Updated 3 weeks ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 3 months ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Sep 15, 2023Updated 2 years ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- Active Directory information dumper via ADWS for evasion purposes.☆213Feb 23, 2026Updated last month
- A BOF to enumerate system process, their protection levels, and more.☆126Nov 27, 2024Updated last year
- Make everyone in your VLAN ASRep roastable☆250Oct 7, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆98Mar 10, 2026Updated 3 weeks ago
- LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to…☆40Nov 4, 2025Updated 5 months ago
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 7 months ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆73Jan 19, 2026Updated 2 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- ☆219Mar 26, 2024Updated 2 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Python module for running BOFs☆79Nov 28, 2025Updated 4 months ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆23Nov 28, 2024Updated last year
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆61Mar 27, 2026Updated last week
- ☆234Oct 8, 2024Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago