C0UNT1NGST4RS / RedTeam-ResourcesLinks
RedTeam Resources By Pwn3rzs / CyberArsenal / C0UNT1NGST4ARS
☆37Updated last year
Alternatives and similar repositories for RedTeam-Resources
Users that are interested in RedTeam-Resources are comparing it to the libraries listed below
Sorting:
- Golang tool to help in forcing a license for HAK5 C2 Tool☆53Updated last year
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆48Updated 8 months ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆99Updated 3 months ago
- A keygen for Specter Insight C2☆35Updated 7 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆116Updated 2 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Updated last year
- CHAOS RAT web panel path RCE PoC☆29Updated last year
- A command and control (C2) server☆57Updated last year
- Bypass Malware Sandbox Evasion Ram check☆139Updated 2 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆107Updated 2 years ago
- A dynamic HTTP/s Payload Stager that automates updating decryption variables, saving time and effort in managing shellcode loaders.☆18Updated last year
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆126Updated 2 years ago
- ☆40Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- ObfuXtreme is an advanced Python obfuscation tool designed to bypass antivirus detection and remain undetectable on VirusTotal.☆166Updated last month
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆71Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆42Updated 3 years ago
- Create Anti-Copy DRM Malware☆65Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆81Updated 7 months ago
- Memory Scaner☆63Updated 3 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆115Updated last year
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆50Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆121Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆103Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated last year
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆85Updated 2 years ago