Backend development stack for agents
☆29Jul 30, 2025Updated 7 months ago
Alternatives and similar repositories for Agent-Development-Stack
Users that are interested in Agent-Development-Stack are comparing it to the libraries listed below
Sorting:
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- ☆12Feb 4, 2025Updated last year
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- ☆19Sep 17, 2025Updated 6 months ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- An offensive toolkit for restless guests #DEFCON33☆53Aug 11, 2025Updated 7 months ago
- Red Team AI prompts☆49Dec 2, 2025Updated 3 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆59Feb 23, 2026Updated 3 weeks ago
- ☆26Nov 7, 2023Updated 2 years ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 9 months ago
- Ludus range for the Constructing Defense Lab☆113Feb 23, 2026Updated 3 weeks ago
- Sniffing files generator☆62Feb 24, 2025Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 3 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 3 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Mar 2, 2025Updated last year
- ☆44Jul 9, 2024Updated last year
- ☆176Oct 21, 2025Updated 4 months ago
- Claude MCP server to perform analysis on ROADrecon data☆49Mar 30, 2025Updated 11 months ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 6 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆65Jan 5, 2026Updated 2 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆43Oct 30, 2024Updated last year