1. Pickl3Windows active user credential phishing tool
2. Apc PpidAdds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.
3. WildpwnBrute forcer and shell deployer for WildFly
4. SpookflareLoader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
6. DazzleupA tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems.
8. RefleXXionRefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtCreateSection, NtOpenSection and NtMapViewOfSection found in the LdrpThunkSignature array.