☆18Jun 10, 2025Updated 9 months ago
Alternatives and similar repositories for CcmMessagingBackdoor
Users that are interested in CcmMessagingBackdoor are comparing it to the libraries listed below
Sorting:
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 8 months ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated last month
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆101Sep 5, 2024Updated last year
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- UAC Bypass using RequestTrace scheduled task☆24Mar 13, 2025Updated last year
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- ☆42Feb 18, 2025Updated last year
- ☆41Oct 8, 2024Updated last year
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆105Feb 25, 2025Updated last year
- ☆14Dec 24, 2023Updated 2 years ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆23Oct 31, 2024Updated last year
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- A cross platform library to write offensive and defensive security tools in Go☆131Dec 28, 2025Updated 2 months ago
- Blog/Journal on how to backdoor VSCode extensions☆78Feb 24, 2026Updated 3 weeks ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆40Dec 5, 2025Updated 3 months ago
- Payload Obfuscation for Red Teams workshop materials☆81Nov 25, 2025Updated 3 months ago
- ☆59Feb 19, 2026Updated last month
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆25Oct 2, 2023Updated 2 years ago
- Mentally ill EtwTi parser☆69Jan 11, 2026Updated 2 months ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- PrimitiveInjection by using Read, Write and Allocation Primitives.☆53Jun 21, 2025Updated 9 months ago
- ☆26Aug 5, 2025Updated 7 months ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- A python library to interact with Pwndoc instances for pentest reports generation☆24May 19, 2025Updated 10 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆61Oct 19, 2024Updated last year
- A small go tool to upload JSON files to the BloodHound community edition API☆31May 29, 2024Updated last year
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆117Oct 6, 2025Updated 5 months ago
- An utility to download PDB files associated with a Portable Executable (PE).☆15Feb 18, 2025Updated last year
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- Efflanrs - GUI for Snaffler Output☆26Sep 13, 2024Updated last year
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 4 months ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago