Project for generating and identifying deceptive LNK files.
☆318Mar 8, 2026Updated last month
Alternatives and similar repositories for lnk-it-up
Users that are interested in lnk-it-up are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated last month
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆150Feb 14, 2026Updated last month
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆264Feb 2, 2026Updated 2 months ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- dcsync bof☆46Feb 13, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Open Source Implementation of Cobalt Strike's Malleable C2☆98Jan 27, 2026Updated 2 months ago
- ☆59Updated this week
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆73Jan 19, 2026Updated 2 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- A BOF that runs unmanaged PEs inline☆689Oct 23, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆613Feb 2, 2026Updated 2 months ago
- A PoC for Early Cascade process injection technique.☆215Jan 30, 2025Updated last year
- Collect Windows telemetry for Maldev☆467Jan 30, 2026Updated 2 months ago
- Minimalistic HTTP(S) client for the NT kernel☆62Dec 1, 2025Updated 4 months ago
- ☆154Oct 2, 2023Updated 2 years ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆129Jan 28, 2026Updated 2 months ago
- Internal Monologue BOF☆78Dec 28, 2024Updated last year
- ☆84May 19, 2024Updated last year
- ☆50Jun 4, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ACL Viewer for Windows☆133May 4, 2025Updated 11 months ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆408Sep 26, 2024Updated last year
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- POC tool to convert CobaltStrike BOF files to raw shellcode☆221Nov 5, 2021Updated 4 years ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆110Aug 18, 2025Updated 7 months ago
- Arsenal of modules to beacon postex☆100Mar 13, 2026Updated 3 weeks ago
- abusing windows toast notifications for fun and user manipulation☆86Mar 20, 2026Updated 2 weeks ago
- ☆20Sep 6, 2025Updated 7 months ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆48Nov 9, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆52Nov 2, 2025Updated 5 months ago
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆59Jan 29, 2015Updated 11 years ago
- Library of BOFs to interact with SQL servers☆231Dec 3, 2025Updated 4 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆481Mar 15, 2026Updated 3 weeks ago
- ForsHops☆153Mar 25, 2025Updated last year
- Sleep obfuscation☆272Dec 13, 2024Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆558Nov 23, 2025Updated 4 months ago