C0UNT1NGST4RS / RedTeam-Resources
RedTeam Resources By Pwn3rzs / CyberArsenal / C0UNT1NGST4ARS
☆24Updated last year
Alternatives and similar repositories for RedTeam-Resources:
Users that are interested in RedTeam-Resources are comparing it to the libraries listed below
- Winsocket for Cobalt Strike.☆98Updated last year
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆42Updated 11 months ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆87Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Create Anti-Copy DRM Malware☆55Updated 7 months ago
- AV/EDR killer using BYOVD technique☆28Updated 6 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆82Updated 2 years ago
- ☆51Updated 3 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆43Updated 11 months ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆37Updated 2 years ago
- Golang tool to help in forcing a license for HAK5 C2 Tool☆46Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆38Updated last year
- Terminate AV/EDR leveraging BYOVD attack☆83Updated 2 weeks ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated 2 years ago
- Rex Shellcode Loader for AV/EDR evasion☆31Updated last year
- A command and control framework.☆49Updated 3 months ago
- PAN-OS auth bypass + RCE☆45Updated 4 months ago
- A simple Sleepmask BOF example☆95Updated 7 months ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆44Updated 2 months ago
- ☆68Updated last year
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆50Updated 3 years ago
- Automated .NET AppDomain hijack payload generation☆122Updated 2 months ago
- Heavily obfuscated ASP web shell generation tool.☆159Updated 11 months ago
- CVE-2023-20198 & 0Day Implant Scanner☆31Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆109Updated 2 years ago
- ☆134Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year