Extension functionality for the NightHawk operator client
☆26Oct 31, 2023Updated 2 years ago
Alternatives and similar repositories for DayBird
Users that are interested in DayBird are comparing it to the libraries listed below
Sorting:
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- ☆18Oct 28, 2025Updated 4 months ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 3 months ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3.☆21Oct 18, 2023Updated 2 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ☆33Mar 19, 2025Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆55Oct 19, 2023Updated 2 years ago
- Sliver agent rewritten in C++☆49Sep 4, 2024Updated last year
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- Blog☆10Jul 18, 2023Updated 2 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆163Oct 25, 2023Updated 2 years ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 6 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- Creating a Bind Shell in C☆19Aug 21, 2023Updated 2 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- ☆84May 19, 2024Updated last year
- Example of building an application verifer DLL☆51Jun 1, 2024Updated last year
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- A stager and implant that executes remote Web Assembly☆37Feb 4, 2026Updated last month
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago