Sickle - Payload Development Kit
☆838Jan 14, 2026Updated 2 months ago
Alternatives and similar repositories for sickle-pdk
Users that are interested in sickle-pdk are comparing it to the libraries listed below
Sorting:
- Interactive shellcoding environment to easily craft shellcodes☆909Feb 26, 2021Updated 5 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆75Mar 13, 2026Updated last week
- Payload Generation Framework☆1,976Aug 21, 2024Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- A tool to create a JScript file which loads a .NET v2 assembly from memory.☆1,318Jan 18, 2021Updated 5 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A tool to elevate privilege with Windows Tokens☆1,063Oct 6, 2023Updated 2 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- Token Privilege Research☆873Sep 1, 2017Updated 8 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆760Jan 28, 2019Updated 7 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- Socks proxy, and reverse socks server using powershell.☆806Dec 9, 2025Updated 3 months ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- HTA encryption tool for RedTeams☆1,421Nov 9, 2022Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,004Jan 15, 2019Updated 7 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,649Oct 11, 2018Updated 7 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,735Jan 16, 2026Updated 2 months ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆533Jul 2, 2025Updated 8 months ago
- Tool for extracting information from newly spawned processes☆777May 11, 2025Updated 10 months ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆933Jun 1, 2021Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆1,536Mar 23, 2023Updated 2 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- Windows passwords decryption from dump files☆512Feb 2, 2023Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,491Jul 8, 2025Updated 8 months ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆1,088Jul 26, 2021Updated 4 years ago
- Modern tactical exploitation toolkit.☆859Mar 9, 2026Updated last week
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,511Nov 15, 2023Updated 2 years ago
- Also known by Microsoft as Knifecoat☆1,152Dec 22, 2022Updated 3 years ago
- PowerShell Script to Dump Windows Credentials from the Credential Manager☆733Dec 12, 2017Updated 8 years ago
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆398Apr 22, 2018Updated 7 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,902Jan 24, 2024Updated 2 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,451Nov 20, 2025Updated 4 months ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,308Aug 19, 2019Updated 6 years ago
- Pop shells like a master.☆1,490Apr 2, 2019Updated 6 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago