The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.
☆475Mar 15, 2026Updated last week
Alternatives and similar repositories for Wyrm
Users that are interested in Wyrm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linker for Beacon Object Files☆170Feb 22, 2026Updated last month
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆211Dec 17, 2025Updated 3 months ago
- AppLocker-Based EDR Neutralization☆327Dec 19, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆51Nov 2, 2025Updated 4 months ago
- ☆36Jul 1, 2025Updated 8 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆528Oct 3, 2025Updated 5 months ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆115Mar 6, 2026Updated 3 weeks ago
- BOF with Synthetic Stackframe☆235Oct 30, 2025Updated 4 months ago
- Extract the SAM and SYSTEM hives using the Volume Shadow Copy (VSS) API. With exfiltration and XOR obfuscation options. Implemented in C#…☆344Feb 2, 2026Updated last month
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 6 months ago
- KittyLoader is a highly evasive loader written in C / Assembly☆260Sep 22, 2025Updated 6 months ago
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆330Updated this week
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 8 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 7 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- A tool to transform Chromium browsers into a C2 Implant☆565Dec 17, 2025Updated 3 months ago
- EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.☆820Nov 1, 2025Updated 4 months ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Mythic Agent written in PIC C.☆205Feb 4, 2025Updated last year
- Easy peasy file uploads☆33Aug 29, 2025Updated 6 months ago
- A command and control framework written in rust.☆385Sep 4, 2025Updated 6 months ago
- ☆53Sep 23, 2025Updated 6 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- ☆337Aug 20, 2025Updated 7 months ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This is the tool to dump the LSASS process on modern Windows 11☆565Nov 1, 2025Updated 4 months ago
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆246Mar 9, 2026Updated 2 weeks ago
- Rust crate to parse user-mode minidump files generated on Windows☆18Nov 17, 2025Updated 4 months ago
- Sleep Obfuscation in Rust☆281Dec 1, 2025Updated 3 months ago
- A BOF that's a BOF Loader and more☆201Jan 17, 2026Updated 2 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 8 months ago