C0UNT1NGST4RS / RedTeam-ResourcesLinks
RedTeam Resources By Pwn3rzs / CyberArsenal / C0UNT1NGST4ARS
☆38Updated last year
Alternatives and similar repositories for RedTeam-Resources
Users that are interested in RedTeam-Resources are comparing it to the libraries listed below
Sorting:
- Golang tool to help in forcing a license for HAK5 C2 Tool☆53Updated last year
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆108Updated 2 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆139Updated 2 years ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆49Updated 9 months ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆42Updated 3 years ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆100Updated 4 months ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Neton is a tool for getting information from Internet connected sandboxes☆96Updated 2 years ago
- A keygen for Specter Insight C2☆37Updated 8 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆82Updated 7 months ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆126Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆115Updated last year
- A command and control (C2) server☆57Updated last year
- A dynamic HTTP/S stager that lets one shellcode loader be reused for different encrypted payloads - no rebuilds.☆19Updated 2 weeks ago
- CHAOS RAT web panel path RCE PoC☆29Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Winsocket for Cobalt Strike.☆100Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- RTF Crash POC Python 3.11 Windows 10☆46Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- ☆40Updated last year
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆52Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆122Updated last year
- A lightweight, modular Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆61Updated this week
- An aggressor script that can help automate payload building in Cobalt Strike☆118Updated last year
- A command and control framework.☆55Updated 9 months ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆104Updated last year