zero2504 / Fairy-LawView external linksLinks
Fairy Law - Compromise or disable EDR security solutions
☆67Dec 1, 2025Updated 2 months ago
Alternatives and similar repositories for Fairy-Law
Users that are interested in Fairy-Law are comparing it to the libraries listed below
Sorting:
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated last month
- Minimalistic HTTP(S) client for the NT kernel☆61Dec 1, 2025Updated 2 months ago
- The instant digital "Do Not Touch" sign for your Mac. Stop fingerprints and protect your expensive display with one keystroke.☆29Jan 13, 2026Updated last month
- ☆30Oct 13, 2025Updated 4 months ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆105Sep 4, 2025Updated 5 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 6 months ago
- The DCERPC only printerbug.py version☆201Oct 30, 2025Updated 3 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆140Dec 6, 2025Updated 2 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Jul 31, 2025Updated 6 months ago
- A Qemu Proxmox Template builder project using Packer☆71Dec 5, 2025Updated 2 months ago
- Evasive Payload Delivery Server & C2 Redirector☆112Nov 3, 2025Updated 3 months ago
- Fast Windows post-exploitation wins after initial access.☆28Jan 28, 2026Updated 2 weeks ago
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆25Oct 13, 2025Updated 4 months ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 3 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 2 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆291Updated this week
- sideloading PoC using onedrive.exe & version.dll☆91Oct 30, 2025Updated 3 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆32Sep 5, 2025Updated 5 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Oct 21, 2025Updated 3 months ago
- COM-based DLL Surrogate Injection☆140Dec 9, 2025Updated 2 months ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆64Jun 10, 2025Updated 8 months ago
- A POC to disable TamperProtection and other Defender / MDE components☆253Jun 6, 2024Updated last year
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆30Feb 6, 2026Updated last week
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Jan 5, 2026Updated last month
- ☆28Dec 8, 2025Updated 2 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆40Jan 14, 2024Updated 2 years ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆90Dec 28, 2025Updated last month
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆213Jan 12, 2026Updated last month
- OAuth Device Code Phishing Toolkit☆109Feb 6, 2026Updated last week
- Code execution/injection technique using DLL PEB module structure manipulation☆220Jun 4, 2025Updated 8 months ago
- ☆55May 31, 2025Updated 8 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆222Apr 14, 2025Updated 9 months ago
- Inject DLLs into the explorer process using icons☆403May 18, 2025Updated 8 months ago
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆178Dec 23, 2025Updated last month
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆324Oct 20, 2025Updated 3 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆129Dec 8, 2025Updated 2 months ago