A collection of PoCs to do common things in unconventional ways
☆121Aug 31, 2025Updated 7 months ago
Alternatives and similar repositories for function-collections
Users that are interested in function-collections are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A hoontr must hoont☆107Nov 27, 2025Updated 4 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- Mentally ill EtwTi parser☆69Jan 11, 2026Updated 2 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆202Dec 30, 2025Updated 3 months ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆189Jan 17, 2026Updated 2 months ago
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 3 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆129Jan 28, 2026Updated 2 months ago
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆71Mar 24, 2026Updated 2 weeks ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆282Sep 18, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆295Nov 1, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Adversary Emulation Framework☆129Jul 1, 2025Updated 9 months ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- ForsHops☆153Mar 25, 2025Updated last year
- ☆111Feb 17, 2025Updated last year
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆113Jan 21, 2026Updated 2 months ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Lateral movement with DCOM DLL hijacking☆175Jul 4, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Rust crate to obfuscate strings and byte arrays so they are not in memory when not in use.☆20Mar 2, 2026Updated last month
- BOF with Synthetic Stackframe☆239Oct 30, 2025Updated 5 months ago
- A collection of position independent coding resources☆109Nov 15, 2025Updated 4 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Hide your P/Invoke signatures through other people's signed assemblies☆211Mar 10, 2024Updated 2 years ago
- Generate Proxy DLLs in Rust☆50Mar 2, 2026Updated last month
- Stage 0☆168Dec 18, 2024Updated last year
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆225Aug 31, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆286Jun 8, 2023Updated 2 years ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆383Dec 13, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆136Aug 31, 2025Updated 7 months ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆282Feb 24, 2025Updated last year
- ☆65Dec 19, 2024Updated last year
- Code execution/injection technique using DLL PEB module structure manipulation☆224Jun 4, 2025Updated 10 months ago