Convert .reg to registry hive and reciprocally, without elevation
☆83Feb 18, 2026Updated last week
Alternatives and similar repositories for HiveSwarming
Users that are interested in HiveSwarming are comparing it to the libraries listed below
Sorting:
- Rainbow table generation & lookup tools.☆31Dec 17, 2025Updated 2 months ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 9 months ago
- Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData!☆75Feb 4, 2026Updated 3 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆197Nov 4, 2025Updated 3 months ago
- A tunneling toolkit enabling operators to move data from one place to another evasively.☆76Nov 3, 2025Updated 3 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- Awesome MalDev Links☆39Updated this week
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- A BOF to create a scheduled task using a COM object.☆16Dec 3, 2024Updated last year
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 4 months ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 5 months ago
- An utility to download PDB files associated with a Portable Executable (PE).☆15Feb 18, 2025Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 6 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 3 months ago
- Tool to remotely dump secrets from the Windows registry☆521Updated this week
- Direct system calls by nim☆14Mar 15, 2022Updated 3 years ago
- CPL remote trigger☆43Dec 28, 2025Updated 2 months ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆146Dec 6, 2025Updated 2 months ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆122Dec 23, 2025Updated 2 months ago
- Situational Awareness script to identify how and where to run implants☆68Dec 6, 2024Updated last year
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- A simple tool for enumerating dynamic endpoints on a DCE/RPC remote or local endpoint mapper.☆15Oct 9, 2020Updated 5 years ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- string encryption in Nim☆20Jun 15, 2024Updated last year
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 6 months ago
- ☆159Dec 13, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 2 months ago
- Tool to extract powerful tokens from Office desktop apps memory☆74Mar 1, 2024Updated 2 years ago