Starred repositories
Silently Install Chrome Extension For Persistence
Run programs in a network namespace where all traffic go through proxy
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…
PoC Exploit for the NTLM reflection SMB flaw.
This code silently installs Chrome extensions on MacOS and Windows
SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.
Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.
Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll
Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
cainiao1992 / ollvm-mingw
Forked from mstorsjo/llvm-mingwAn Obfuscator-LLVM based mingw-w64 toolchain.
Make everyone in your VLAN ASRep roastable
A self hosted virtual browser that runs in docker and uses WebRTC.
List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.
simplest & fastest way to transfer files between computers via WireGuard
A BloodHound collector for Microsoft Configuration Manager
A delicious, but malicious SSL-VPN server 🌮
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.
A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.
MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.