PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.
☆33Dec 31, 2025Updated 4 months ago
Alternatives and similar repositories for OffsetInspect
Users that are interested in OffsetInspect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 8 months ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆107Apr 22, 2026Updated last week
- PolyEngine is an evasive PE packer designed for CTF challenges and low-level Windows security education. It focuses on bypassing EDR and …☆57Updated this week
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 6 months ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆48Oct 3, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Overview of MS Defender☆139Feb 20, 2026Updated 2 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆85Apr 10, 2026Updated 2 weeks ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Living of the Land of Free SaaS☆71Mar 22, 2026Updated last month
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆61Nov 24, 2025Updated 5 months ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated 2 months ago
- ☆28Mar 14, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆41Mar 3, 2026Updated last month
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆102Jan 10, 2026Updated 3 months ago
- A Qemu Proxmox Template builder project using Packer☆74Dec 5, 2025Updated 4 months ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆61Apr 8, 2026Updated 3 weeks ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 4 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- ☆77Feb 27, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆77Apr 11, 2026Updated 2 weeks ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 6 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆168Nov 2, 2025Updated 5 months ago
- Lab4PurpleSec is a modular Purple Team homelab combining a vulnerable Active Directory environment (GOAD), a Docker-based web DMZ, pfSens…☆223Dec 31, 2025Updated 4 months ago
- Notion C2 Profile for Mythic☆45Mar 3, 2026Updated last month
- The code I write in my blog☆94Feb 21, 2026Updated 2 months ago
- A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type dete…☆67Feb 23, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆253Oct 30, 2025Updated 6 months ago
- ☆86May 15, 2025Updated 11 months ago
- Shellcode injection using the Windows Debugging API☆178Jan 4, 2026Updated 3 months ago
- ☆14Jul 26, 2025Updated 9 months ago
- TLS fingerprint emulation upstream proxy replay any ClientHello☆43Apr 6, 2026Updated 3 weeks ago
- A powerful Redis exploitation tool that leverages CVE-2025-4984☆66Oct 10, 2025Updated 6 months ago
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆192Mar 2, 2026Updated last month