Project for generating and identifying deceptive LNK files.
☆330Mar 8, 2026Updated last month
Alternatives and similar repositories for lnk-it-up
Users that are interested in lnk-it-up are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆76Mar 15, 2026Updated last month
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆159Feb 14, 2026Updated 2 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 9 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated 2 months ago
- Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by …☆212Apr 16, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆263Feb 2, 2026Updated 2 months ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated 2 months ago
- dcsync bof☆52Feb 13, 2026Updated 2 months ago
- This cheatsheet maps common impacket workflows to their modern alternatives☆205Apr 21, 2026Updated last week
- Open Source Implementation of Cobalt Strike's Malleable C2☆98Jan 27, 2026Updated 3 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆83Nov 6, 2025Updated 5 months ago
- A PoC for Early Cascade process injection technique.☆216Jan 30, 2025Updated last year
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Collect Windows telemetry for Maldev☆471Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆75Jan 19, 2026Updated 3 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- Library of BOFs to interact with SQL servers☆232Dec 3, 2025Updated 4 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆427Apr 18, 2026Updated last week
- A BOF that runs unmanaged PEs inline☆695Oct 23, 2024Updated last year
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆69Mar 20, 2024Updated 2 years ago
- ☆77Apr 8, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆630Feb 2, 2026Updated 2 months ago
- Minimalistic HTTP(S) client for the NT kernel☆61Dec 1, 2025Updated 4 months ago
- A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.☆146Apr 15, 2026Updated 2 weeks ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆133Jan 28, 2026Updated 3 months ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- ☆156Oct 2, 2023Updated 2 years ago
- ☆84May 19, 2024Updated last year
- ☆50Jun 4, 2025Updated 10 months ago
- ACL Viewer for Windows☆133May 4, 2025Updated 11 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- POC tool to convert CobaltStrike BOF files to raw shellcode☆222Nov 5, 2021Updated 4 years ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆111Aug 18, 2025Updated 8 months ago
- Arsenal of modules to beacon postex☆102Mar 13, 2026Updated last month
- An Ansible collection that installs an ADFS deployment with optional configurations.☆45Dec 19, 2025Updated 4 months ago
- ☆568Feb 22, 2024Updated 2 years ago
- ☆23Sep 6, 2025Updated 7 months ago