Rust Weaponization for Red Team Engagements.
☆28Nov 8, 2022Updated 3 years ago
Alternatives and similar repositories for OffensiveRust
Users that are interested in OffensiveRust are comparing it to the libraries listed below
Sorting:
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Sep 8, 2023Updated 2 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Basic Dart reverse shell code☆21Nov 10, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Playground for Race Condition attack☆24Mar 18, 2023Updated 3 years ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- ☆39Feb 26, 2025Updated last year
- C# Admin Control Panel Finder For Windows☆46Sep 23, 2019Updated 6 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆387Jul 30, 2024Updated last year
- A plugin for IDA Pro and Cheat Engine to get the offset of the current module☆11May 30, 2024Updated last year
- Execute shellcode files with rundll32☆218Jan 28, 2024Updated 2 years ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆13Aug 17, 2023Updated 2 years ago
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆18Sep 9, 2025Updated 6 months ago
- ☆16Oct 18, 2024Updated last year
- cmd tools for AWD☆14Jun 10, 2023Updated 2 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Implementation of rfc7664 dragonfly key exchange using ECC☆20Oct 12, 2018Updated 7 years ago
- ☆18Mar 26, 2024Updated last year
- ☆13Jan 27, 2024Updated 2 years ago
- ☆17Feb 25, 2024Updated 2 years ago
- Syntax Highlighting for Hare☆11Aug 12, 2022Updated 3 years ago
- ☆20Feb 1, 2026Updated last month
- ☆412Dec 14, 2023Updated 2 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- ☆28Feb 6, 2024Updated 2 years ago
- Spreading the word of: https://github.com/imrk51/CEH-v11-Study-Guide☆17Nov 3, 2022Updated 3 years ago
- SUCTF iCloudMusic 源码及writeup☆10Oct 12, 2022Updated 3 years ago
- Laser for entertain your cat with an esp8266 connected to WIFI and usable through a Blynk app.☆16Oct 30, 2018Updated 7 years ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Apr 7, 2024Updated last year
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated last month
- ☆106Sep 12, 2024Updated last year
- Examples and code for the book "Feedback Control for Computer Systems"☆16Nov 18, 2020Updated 5 years ago
- random code snippets, useful for getting started☆122Nov 29, 2025Updated 3 months ago