xelemental / Mal-LNK-GeneratorView external linksLinks
☆39Mar 28, 2025Updated 10 months ago
Alternatives and similar repositories for Mal-LNK-Generator
Users that are interested in Mal-LNK-Generator are comparing it to the libraries listed below
Sorting:
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 6 months ago
- ☆33Mar 19, 2025Updated 10 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Mar 25, 2025Updated 10 months ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 2 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 5 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆12May 17, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆47Oct 4, 2025Updated 4 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆75Jul 25, 2025Updated 6 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆20Nov 24, 2025Updated 2 months ago
- malware written for educational purposes☆71Dec 31, 2025Updated last month
- a BOF implementation of various registry persistence methods☆95Nov 11, 2025Updated 3 months ago
- SCEP request tool for AD CS and Intune☆73Oct 24, 2025Updated 3 months ago
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated last year
- A python library to create BloodHound OpenGraphs☆52Feb 4, 2026Updated last week
- ☆50Apr 9, 2025Updated 10 months ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 7 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- A PoC for Early Cascade process injection technique.☆208Jan 30, 2025Updated last year
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 2 months ago
- Find Inbound Email Domains☆35Dec 21, 2023Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- ☆235Oct 8, 2024Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆121Jul 11, 2025Updated 7 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42May 31, 2024Updated last year
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆285Jun 8, 2023Updated 2 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- ForsHops☆152Mar 25, 2025Updated 10 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆97Feb 8, 2026Updated last week
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆135Apr 6, 2025Updated 10 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 5 months ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- BOF with Synthetic Stackframe☆220Oct 30, 2025Updated 3 months ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆38Jan 12, 2026Updated last month
- command control framework☆29Feb 8, 2026Updated last week
- ☆21May 27, 2024Updated last year