warpedatom / OffsetInspectLinks
PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.
☆31Updated last week
Alternatives and similar repositories for OffsetInspect
Users that are interested in OffsetInspect are comparing it to the libraries listed below
Sorting:
- A python script that automates a C2 Profile build☆48Updated 3 weeks ago
- ☆57Updated 6 months ago
- This C# tool sprays for admin access over the entire domain☆84Updated last month
- Remote DLL Injection with Timer-based Shellcode Execution☆153Updated 5 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆97Updated last month
- ☆35Updated 6 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆57Updated 8 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆28Updated last month
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆162Updated 2 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆111Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆155Updated 2 months ago
- Utilizng an MCP Server to communicate with your C2☆86Updated 7 months ago
- Permanently disable EDRs as local admin☆123Updated 2 weeks ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆134Updated last month
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆47Updated 4 months ago
- A tool to play with scheduled tasks on Windows, in Rust☆122Updated 2 months ago
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- A small How-To on creating your own weaponized WSL file☆119Updated 5 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 6 months ago
- Execute shellcode via ASPNET compiler☆59Updated 3 months ago
- Convert your shellcode into an ASCII string☆124Updated 6 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆102Updated 2 weeks ago
- Client-side Encrypted Upload Server Python Script☆66Updated 5 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 7 months ago
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆46Updated 2 months ago
- ☆155Updated 8 months ago
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Updated 2 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆134Updated 6 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆89Updated 10 months ago