Umbrella will protect your shellcode from the rain.
☆30Jun 4, 2025Updated 10 months ago
Alternatives and similar repositories for Umbrella
Users that are interested in Umbrella are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆74Mar 15, 2026Updated last month
- ☆10Jul 1, 2023Updated 2 years ago
- Aliasr is a modern, feature-rich TUI launcher for pentest commands.☆106Mar 15, 2026Updated last month
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆31Oct 2, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆141Apr 6, 2025Updated last year
- Malware traffic obfuscation library☆38Jul 24, 2025Updated 8 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆68Jan 5, 2026Updated 3 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆70Sep 10, 2025Updated 7 months ago
- Notion C2 Profile for Mythic☆43Mar 3, 2026Updated last month
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 3 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- ☆59Dec 10, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆128Jan 17, 2026Updated 3 months ago
- Examples of various container types for Python and Golang☆15Aug 29, 2025Updated 7 months ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Windows Privilege Escalation☆24Jun 7, 2022Updated 3 years ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆59Apr 10, 2026Updated last week
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆94Jul 7, 2025Updated 9 months ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆57Jul 13, 2025Updated 9 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆71Mar 8, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- Bypassing Amsi using LdrLoadDll☆48Jan 8, 2025Updated last year
- Yet another shellcode loader - but a sneaky one☆26Apr 16, 2025Updated last year
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆51Jun 16, 2025Updated 10 months ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆44Aug 10, 2025Updated 8 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆148Jul 17, 2025Updated 9 months ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Sep 29, 2022Updated 3 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆15Apr 25, 2022Updated 3 years ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆203Dec 30, 2025Updated 3 months ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆19Aug 4, 2024Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆45Feb 19, 2026Updated 2 months ago
- Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specific…☆127Apr 13, 2026Updated last week
- Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled T…☆92Jan 24, 2026Updated 2 months ago
- PoC XLL builder in Python/Nim☆50Nov 21, 2022Updated 3 years ago