Fairy Law - Compromise or disable EDR security solutions
☆71Dec 1, 2025Updated 5 months ago
Alternatives and similar repositories for Fairy-Law
Users that are interested in Fairy-Law are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 5 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆102Jan 10, 2026Updated 3 months ago
- Minimalistic HTTP(S) client for the NT kernel☆61Dec 1, 2025Updated 5 months ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆109Sep 4, 2025Updated 8 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 5 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆208Jul 18, 2025Updated 9 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆37Apr 16, 2024Updated 2 years ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆161Nov 23, 2025Updated 5 months ago
- Blog/Journal on how to backdoor VSCode extensions☆79Feb 24, 2026Updated 2 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆152Dec 6, 2025Updated 5 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆141Dec 8, 2025Updated 4 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆33Sep 5, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- COM-based DLL Surrogate Injection☆169Dec 9, 2025Updated 4 months ago
- Go (formerly PowerShell) collector for adding MSSQL attack paths to BloodHound with OpenGraph☆317Apr 23, 2026Updated last week
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 9 months ago
- A POC to disable TamperProtection and other Defender / MDE components☆256Jun 6, 2024Updated last year
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆69Jan 5, 2026Updated 4 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆113Dec 28, 2025Updated 4 months ago
- GitLab Attack TOolkit☆34Apr 24, 2026Updated last week
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 3 months ago
- Code execution/injection technique using DLL PEB module structure manipulation☆224Jun 4, 2025Updated 11 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 6 months ago
- Tools for attacking Computer Use Agents☆30Jan 16, 2026Updated 3 months ago
- 在线安软识别☆12Aug 6, 2025Updated 9 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆40Jan 14, 2024Updated 2 years ago
- ☆108Aug 21, 2024Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆96Oct 7, 2024Updated last year
- ☆28Mar 14, 2026Updated last month
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆216Apr 17, 2026Updated 2 weeks ago
- ☆19Nov 26, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- arm64 linux position-independent shellcode framework☆31Dec 12, 2025Updated 4 months ago
- OAuth Device Code Phishing Toolkit☆123Apr 18, 2026Updated 2 weeks ago
- ☆30Oct 13, 2025Updated 6 months ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 8 months ago
- General Purpose OpSec Server☆114Mar 13, 2026Updated last month
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- A collection of position independent coding resources☆113Nov 15, 2025Updated 5 months ago