"Two-Face" Rust binary on Linux
☆51Nov 10, 2025Updated 5 months ago
Alternatives and similar repositories for twoface
Users that are interested in twoface are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- ☆40Nov 25, 2025Updated 5 months ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 9 months ago
- game of active directory (SnapLabs version)☆17Aug 12, 2025Updated 8 months ago
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- arm64 linux position-independent shellcode framework☆31Dec 12, 2025Updated 4 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated 2 months ago
- A Crystal Palace shared library to resolve & perform syscalls☆61Oct 29, 2025Updated 6 months ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- A Beacon Object File suite for Microsoft SQL Server that speaks TDS 7.4 on the wire itself☆93Apr 9, 2026Updated 3 weeks ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- A C++17 header-only library that provides compile-time string encryption and decryption using SIMD instructions and junk code injection.☆28Mar 2, 2026Updated 2 months ago
- C++ Assembler with Built-in Mutation Engine☆30Sep 6, 2025Updated 7 months ago
- Overlord☆79Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Example firmware for the Nokia 3310 M17 replacement board.☆19Feb 6, 2026Updated 2 months ago
- Open source PS4 SDK☆11Oct 27, 2018Updated 7 years ago
- Changes Neovim working directory to project root.☆24Apr 19, 2026Updated 2 weeks ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 9 months ago
- Honeyquest is a cyber security game that asks humans to distinguish neutral, risky, and deceptive payloads. Honeyquest presents participa…☆14Jan 8, 2026Updated 3 months ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆61Mar 17, 2025Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆167Jul 30, 2025Updated 9 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆69Jan 5, 2026Updated 3 months ago
- Introducing a powerful solution that converts any non-XP-compatible 32-bit exe or dll into a Windows XP-friendly binary. Our patch files …☆30Apr 3, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- AWS X-Ray for Covert Command & Control☆46Oct 13, 2025Updated 6 months ago
- ASPX Web Shell with COFF Loader☆129Mar 10, 2026Updated last month
- A tool used the Sleep Obfuscation and Memory encrypt technique to evade the anti-virus.A Proof of Concept,only used for study purpose.☆40Aug 29, 2024Updated last year
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆37Apr 16, 2024Updated 2 years ago
- Aims to become the definitive reference for escaping commands for system()☆22Jan 31, 2014Updated 12 years ago
- Preseed configuration for the Debian installer.☆15Apr 20, 2026Updated 2 weeks ago
- Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable AP…☆108Apr 22, 2026Updated last week
- ☆109Dec 10, 2025Updated 4 months ago
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- HVNC based on RustDesk☆112May 1, 2024Updated 2 years ago
- Minimalistic HTTP(S) client for the NT kernel☆61Dec 1, 2025Updated 5 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 8 months ago
- Booting multi-processors on x86 bare-metal.☆12Feb 25, 2022Updated 4 years ago
- Fairy Law - Compromise or disable EDR security solutions☆71Dec 1, 2025Updated 5 months ago
- Execute commands across Windows and Linux systems using multiple RCE methods☆91Mar 2, 2026Updated 2 months ago