The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.
☆491Mar 15, 2026Updated last month
Alternatives and similar repositories for Wyrm
Users that are interested in Wyrm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linker for Beacon Object Files☆179Mar 30, 2026Updated last month
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆210Dec 25, 2024Updated last year
- AppLocker-Based EDR Neutralization☆336Dec 19, 2025Updated 4 months ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆53Nov 2, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆220Dec 17, 2025Updated 4 months ago
- ☆37Jul 1, 2025Updated 10 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆197Feb 6, 2025Updated last year
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆118Mar 6, 2026Updated 2 months ago
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆349Mar 21, 2026Updated last month
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆563Oct 3, 2025Updated 7 months ago
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- Extract the SAM and SYSTEM hives using the Volume Shadow Copy (VSS) API. With exfiltration and XOR obfuscation options. Implemented in C#…☆353Feb 2, 2026Updated 3 months ago
- BOF with Synthetic Stackframe☆244Oct 30, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 7 months ago
- KittyLoader is a highly evasive loader written in C / Assembly☆262Sep 22, 2025Updated 7 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 8 months ago
- Lateral movement with DCOM DLL hijacking☆178Jul 4, 2025Updated 10 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆237Feb 12, 2025Updated last year
- A Mythic Agent written in PIC C.☆204Feb 4, 2025Updated last year
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 9 months ago
- EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.☆829Nov 1, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool to transform Chromium browsers into a C2 Implant☆577Dec 17, 2025Updated 4 months ago
- Easy peasy file uploads☆35Aug 29, 2025Updated 8 months ago
- A command and control framework written in rust.☆386Apr 27, 2026Updated last week
- ☆52Mar 30, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- ☆342Aug 20, 2025Updated 8 months ago
- Adversary Emulation Framework☆130Jul 1, 2025Updated 10 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This is the tool to dump the LSASS process on modern Windows 11☆574Nov 1, 2025Updated 6 months ago
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆247Mar 9, 2026Updated last month
- Rust crate to parse user-mode minidump files generated on Windows☆18Nov 17, 2025Updated 5 months ago
- Sleep Obfuscation in Rust☆281Dec 1, 2025Updated 5 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆3,066Mar 22, 2026Updated last month
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 4 months ago