☆38Mar 28, 2025Updated 11 months ago
Alternatives and similar repositories for Mal-LNK-Generator
Users that are interested in Mal-LNK-Generator are comparing it to the libraries listed below
Sorting:
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- ☆33Mar 19, 2025Updated 11 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Mar 25, 2025Updated 11 months ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 3 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆47Oct 4, 2025Updated 5 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆78Jul 25, 2025Updated 7 months ago
- a BOF implementation of various registry persistence methods☆94Nov 11, 2025Updated 3 months ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 4 months ago
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated last year
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated last month
- ☆49Apr 9, 2025Updated 10 months ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 3 months ago
- Find Inbound Email Domains☆35Dec 21, 2023Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- ☆234Oct 8, 2024Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆123Jul 11, 2025Updated 7 months ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆285Jun 8, 2023Updated 2 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆106Feb 25, 2026Updated last week
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆438Jun 27, 2025Updated 8 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆138Apr 6, 2025Updated 11 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Aug 25, 2025Updated 6 months ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- BOF with Synthetic Stackframe☆230Oct 30, 2025Updated 4 months ago
- command control framework☆32Feb 28, 2026Updated last week
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year