0xTriboulet / Red_Team_Code_SnippetsLinks
random code snippets, useful for getting started
☆123Updated 2 months ago
Alternatives and similar repositories for Red_Team_Code_Snippets
Users that are interested in Red_Team_Code_Snippets are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆71Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆135Updated 4 months ago
- ☆107Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆111Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Updated last year
- Do some DLL SideLoading magic☆89Updated 2 years ago
- Evasive Golang Loader☆137Updated last year
- ☆151Updated 2 years ago
- ☆163Updated 2 years ago
- Your syscall factory☆126Updated 3 weeks ago
- ☆122Updated 2 years ago
- PE obfuscator with Evasion in mind☆213Updated 2 years ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆202Updated 2 years ago
- Local & remote Windows DLL Proxying☆170Updated last year
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Updated 3 years ago
- Shaco is a linux agent for havoc☆169Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Updated 2 years ago
- Port of Cobalt Strike's Process Inject Kit☆190Updated last year
- Windows Persistence IT-Security☆110Updated 11 months ago
- Automated .NET AppDomain hijack payload generation☆129Updated last year
- Bypass Malware Sandbox Evasion Ram check☆141Updated 3 years ago
- Execute shellcode files with rundll32☆214Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆116Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Updated 2 years ago
- ☆89Updated 2 years ago
- Terminate AV/EDR leveraging BYOVD attack☆104Updated 10 months ago