sliverarmory / private-armoryView external linksLinks
A self-hosted Armory implementation.
☆21Jan 1, 2026Updated last month
Alternatives and similar repositories for private-armory
Users that are interested in private-armory are comparing it to the libraries listed below
Sorting:
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 10 months ago
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year
- Installing wazuh SIEM Unified XDR and SIEM protection☆31Jun 3, 2025Updated 8 months ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆43Mar 19, 2024Updated last year
- ☆45Apr 2, 2022Updated 3 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆30Feb 6, 2026Updated last week
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- A simple UEFI bootkit made by @NSG650 and me.☆26Dec 29, 2024Updated last year
- ☆44Nov 7, 2024Updated last year
- ☆26Aug 5, 2025Updated 6 months ago
- A library to make HTTP requests with the Windows winhttp API☆25Feb 8, 2024Updated 2 years ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆66Feb 11, 2025Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- TypeScript/JavaScript client libraries for Sliver☆24Feb 27, 2023Updated 2 years ago
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆56Jun 14, 2023Updated 2 years ago
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 6 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- A repo to support the book☆113Aug 5, 2021Updated 4 years ago
- ☆27Jun 3, 2023Updated 2 years ago
- shell code example☆67Dec 12, 2025Updated 2 months ago
- ☆65Mar 15, 2024Updated last year
- An offensive toolkit for restless guests #DEFCON33☆54Aug 11, 2025Updated 6 months ago
- Convenience tool for hashcat☆120Aug 26, 2025Updated 5 months ago
- ☆47Dec 5, 2025Updated 2 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Nov 12, 2025Updated 3 months ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- ☆32Jun 1, 2024Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆117Oct 21, 2023Updated 2 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- My personal shellcode loader☆32Mar 9, 2023Updated 2 years ago
- Shellcode loader☆100Nov 24, 2024Updated last year
- rpv is a v library for analyzing RPC servers and interfaces on the Windows operating system☆37Nov 21, 2025Updated 2 months ago
- WIP shellcode loader in nim with EDR evasion techniques☆221Mar 30, 2022Updated 3 years ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- A Proof of Concept Rootkit Demonstrating Keylogging and Virtual File System (VFS) Capabilities☆76Sep 21, 2022Updated 3 years ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆38Feb 4, 2025Updated last year