0xTriboulet / Red_Team_Code_SnippetsLinks
random code snippets, useful for getting started
☆121Updated 9 months ago
Alternatives and similar repositories for Red_Team_Code_Snippets
Users that are interested in Red_Team_Code_Snippets are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆63Updated last year
- Offensive Windows Kernel Toolset☆126Updated last month
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- ☆108Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆106Updated 2 years ago
- Do some DLL SideLoading magic☆86Updated last year
- Automated .NET AppDomain hijack payload generation☆127Updated 6 months ago
- Local & remote Windows DLL Proxying☆165Updated last year
- ☆124Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆108Updated last year
- ApexLdr is a DLL Payload Loader written in C☆112Updated last year
- PE obfuscator with Evasion in mind☆212Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- Terminate AV/EDR leveraging BYOVD attack☆101Updated 5 months ago
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- Command and Control (C2) framework☆128Updated 3 months ago
- ☆152Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆94Updated 10 months ago
- This repository implements Threadless Injection in C☆171Updated last year
- I have documented all of the AMSI patches that I learned till now☆73Updated 5 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆160Updated last year
- Evasive Golang Loader☆134Updated last year
- Windows Persistence IT-Security☆103Updated 5 months ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆40Updated last year
- ☆164Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated last year
- ☆119Updated 5 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆86Updated 4 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year