0xTriboulet / Red_Team_Code_Snippets
random code snippets, useful for getting started
☆116Updated 3 months ago
Alternatives and similar repositories for Red_Team_Code_Snippets:
Users that are interested in Red_Team_Code_Snippets are comparing it to the libraries listed below
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago
- Create Anti-Copy DRM Malware☆52Updated 6 months ago
- ☆107Updated last year
- ☆120Updated last year
- Evasive Golang Loader☆131Updated 6 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Windows Kernel Offensive Toolset☆119Updated 5 months ago
- Port of Cobalt Strike's Process Inject Kit☆165Updated 2 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated last year
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆144Updated 9 months ago
- ApexLdr is a DLL Payload Loader written in C☆109Updated 7 months ago
- ☆180Updated last year
- ☆107Updated 3 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆147Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆118Updated 7 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Do some DLL SideLoading magic☆78Updated last year
- My implementation of the GIUDA project in C++☆167Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆176Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.☆230Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 9 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆172Updated 2 months ago
- Just another C2 Redirector using CloudFlare.☆86Updated 9 months ago
- Your syscall factory☆120Updated last month
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆135Updated 2 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆85Updated 8 months ago