Commandline spoofing on Windows
☆101Nov 25, 2025Updated 5 months ago
Alternatives and similar repositories for commandline_spoofing
Users that are interested in commandline_spoofing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vectored Exception Handling Squared☆30Dec 27, 2025Updated 4 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated last month
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- ☆61Apr 20, 2026Updated 2 weeks ago
- ☆11Feb 12, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆14Dec 26, 2024Updated last year
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- RPC to WebClient startup☆57Aug 19, 2025Updated 8 months ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 5 months ago
- A small How-To on creating your own weaponized WSL file☆126Jul 23, 2025Updated 9 months ago
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 10 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- shell code example☆68Dec 12, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 10 months ago
- Arsenal of modules to beacon postex☆103Mar 13, 2026Updated last month
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 9 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆33Sep 24, 2025Updated 7 months ago
- Lateral movement with DCOM DLL hijacking☆178Jul 4, 2025Updated 10 months ago
- Bof of RegPwn by MDSec☆118Mar 15, 2026Updated last month
- A collection of PoCs to do common things in unconventional ways☆122Aug 31, 2025Updated 8 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆44Oct 30, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A BOF to enumerate system process, their protection levels, and more.☆126Nov 27, 2024Updated last year
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 7 months ago
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆155Nov 23, 2025Updated 5 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆160Feb 14, 2026Updated 2 months ago
- Blog/Journal on how to backdoor VSCode extensions☆79Feb 24, 2026Updated 2 months ago
- Utilizng an MCP Server to communicate with your C2☆91May 15, 2025Updated 11 months ago
- Windows Session Hijacking via COM☆347Dec 13, 2025Updated 4 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆51Jul 6, 2025Updated 10 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 6 months ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 9 months ago
- A Mythic agent for Windows written in C☆162Apr 9, 2026Updated 3 weeks ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 5 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- ☆34Mar 19, 2025Updated last year