0xTriboulet / Red_Team_Code_Snippets
random code snippets, useful for getting started
☆117Updated 4 months ago
Alternatives and similar repositories for Red_Team_Code_Snippets:
Users that are interested in Red_Team_Code_Snippets are comparing it to the libraries listed below
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- ☆107Updated last year
- ☆121Updated last year
- This repository implements Threadless Injection in C☆161Updated last year
- Evasive Golang Loader☆129Updated 7 months ago
- Windows Kernel Offensive Toolset☆119Updated 6 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆181Updated last year
- Create Anti-Copy DRM Malware☆54Updated 7 months ago
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆99Updated last year
- ☆149Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆88Updated 9 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆231Updated last year
- Weaponized HellsGate/SigFlip☆198Updated last year
- 「💀」Proof of concept on BYOVD attack☆155Updated 3 months ago
- ApexLdr is a DLL Payload Loader written in C☆109Updated 8 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆157Updated 9 months ago
- (Demo) 3rd party agent for Havoc☆134Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆78Updated last year
- ☆181Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆144Updated 2 years ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆172Updated last month
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆149Updated last week
- Execute shellcode files with rundll32☆193Updated last year
- Do some DLL SideLoading magic☆79Updated last year
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆138Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆118Updated 8 months ago