BlackINT3 / RedKits
Cyber Security Reseraching and RedTeam Kits Code
☆34Updated 2 years ago
Alternatives and similar repositories for RedKits:
Users that are interested in RedKits are comparing it to the libraries listed below
- Beacon Object Files.☆32Updated 11 months ago
- ☆9Updated 11 months ago
- old postex for grabbing a krbtgs for my current user☆29Updated last year
- ☆13Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆37Updated 2 years ago
- VM Escape for Parallels Desktop <18.1.1☆38Updated last year
- Collection of self-made Red Team tools that have come in handy☆11Updated 5 months ago
- ☆18Updated 2 years ago
- This is a simple project made to evade https://github.com/thefLink/Hunt-Sleeping-Beacons by using a busy wait instead of beacon's built i…☆32Updated 3 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆13Updated last year
- AV/EDR killer using BYOVD technique☆26Updated 4 months ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆31Updated last year
- DLL Unhooking☆12Updated 3 years ago
- Winsocket for Cobalt Strike.☆99Updated last year
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆17Updated 3 months ago
- Caeser Cipher your shellcode!☆20Updated 2 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆13Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated last year
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆32Updated 10 months ago
- Core Submodule of Exploration C2☆14Updated this week
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Updated last year
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Updated 2 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Updated last year
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆12Updated 2 years ago
- Tomcat backdoor based on CS blog☆27Updated last year
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- Sliver agent rewritten in C++☆43Updated 4 months ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆25Updated 2 years ago