☆17Jun 10, 2025Updated 8 months ago
Alternatives and similar repositories for CcmMessagingBackdoor
Users that are interested in CcmMessagingBackdoor are comparing it to the libraries listed below
Sorting:
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 9 months ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated 2 weeks ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- A dotnet executable to get an Entra token in an authenticated runtime☆16Oct 30, 2024Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆99Sep 5, 2024Updated last year
- ☆40Oct 8, 2024Updated last year
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- Payload Obfuscation for Red Teams workshop materials☆78Nov 25, 2025Updated 3 months ago
- A cross platform library to write offensive and defensive security tools in Go☆131Dec 28, 2025Updated 2 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated last month
- ☆42Feb 18, 2025Updated last year
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆22Oct 31, 2024Updated last year
- A tool to create randomly insecure file shares that also contain unsecured credential files☆48Feb 16, 2026Updated 2 weeks ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- UAC Bypass using RequestTrace scheduled task☆23Mar 13, 2025Updated 11 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 2 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆115Oct 6, 2025Updated 4 months ago
- ☆26Aug 5, 2025Updated 6 months ago
- A python library to interact with Pwndoc instances for pentest reports generation☆22May 19, 2025Updated 9 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆24Oct 2, 2023Updated 2 years ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- a minimalistic winrm client written in python☆25May 15, 2025Updated 9 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- ☆48May 12, 2021Updated 4 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- SMB Audit Tool you were looking for☆24Jun 16, 2023Updated 2 years ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆65Dec 16, 2023Updated 2 years ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆60Updated this week
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆33Jan 23, 2025Updated last year
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆19Nov 13, 2025Updated 3 months ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- PrimitiveInjection by using Read, Write and Allocation Primitives.☆53Jun 21, 2025Updated 8 months ago
- Blog/Journal on how to backdoor VSCode extensions☆76Updated this week
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆61Oct 19, 2024Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year