The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.
☆481Mar 15, 2026Updated last month
Alternatives and similar repositories for Wyrm
Users that are interested in Wyrm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linker for Beacon Object Files☆175Mar 30, 2026Updated 2 weeks ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆215Dec 17, 2025Updated 4 months ago
- AppLocker-Based EDR Neutralization☆334Dec 19, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆52Nov 2, 2025Updated 5 months ago
- ☆37Jul 1, 2025Updated 9 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆116Mar 6, 2026Updated last month
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆345Mar 21, 2026Updated 3 weeks ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆555Oct 3, 2025Updated 6 months ago
- Extract the SAM and SYSTEM hives using the Volume Shadow Copy (VSS) API. With exfiltration and XOR obfuscation options. Implemented in C#…☆347Feb 2, 2026Updated 2 months ago
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- BOF with Synthetic Stackframe☆240Oct 30, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 7 months ago
- KittyLoader is a highly evasive loader written in C / Assembly☆262Sep 22, 2025Updated 6 months ago
- Lateral movement with DCOM DLL hijacking☆175Jul 4, 2025Updated 9 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 8 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- A Mythic Agent written in PIC C.☆203Feb 4, 2025Updated last year
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 9 months ago
- EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.☆825Nov 1, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool to transform Chromium browsers into a C2 Implant☆573Dec 17, 2025Updated 3 months ago
- Easy peasy file uploads☆33Aug 29, 2025Updated 7 months ago
- A command and control framework written in rust.☆386Sep 4, 2025Updated 7 months ago
- ☆52Mar 30, 2026Updated 2 weeks ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆166Oct 21, 2025Updated 5 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 9 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- ☆339Aug 20, 2025Updated 7 months ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is the tool to dump the LSASS process on modern Windows 11☆573Nov 1, 2025Updated 5 months ago
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆247Mar 9, 2026Updated last month
- Rust crate to parse user-mode minidump files generated on Windows☆18Nov 17, 2025Updated 5 months ago
- Sleep Obfuscation in Rust☆281Dec 1, 2025Updated 4 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,969Mar 22, 2026Updated 3 weeks ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 3 months ago