0xTriboulet / OffensiveRust
Rust Weaponization for Red Team Engagements.
☆27Updated 2 years ago
Alternatives and similar repositories for OffensiveRust:
Users that are interested in OffensiveRust are comparing it to the libraries listed below
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 3 weeks ago
- POC for DLL Proxying / Hijacking☆60Updated last month
- ☆69Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- vulnlab.com reaper writeup☆26Updated last year
- Repo for all my exploits/PoCs☆50Updated 2 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- C2 Automation using Linode☆80Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 10 months ago
- ☆17Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆43Updated 6 months ago
- ☆26Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆45Updated last month
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- ☆58Updated 6 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated 8 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆65Updated 2 weeks ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 10 months ago
- OSCP Study Guide☆40Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆87Updated 10 months ago
- ☆34Updated last year
- ☆35Updated 5 months ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆42Updated 3 months ago
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago