C0UNT1NGST4RS / RedTeam-Resources
RedTeam Resources By Pwn3rzs / CyberArsenal / C0UNT1NGST4ARS
☆25Updated last year
Alternatives and similar repositories for RedTeam-Resources:
Users that are interested in RedTeam-Resources are comparing it to the libraries listed below
- Golang tool to help in forcing a license for HAK5 C2 Tool☆47Updated last year
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆37Updated 2 years ago
- CHAOS RAT web panel path RCE PoC☆28Updated last year
- Winsocket for Cobalt Strike.☆98Updated last year
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆42Updated last year
- A keygen for Specter Insight C2☆28Updated 2 months ago
- Powershell shellcode one-liner. Powershell免杀一句话上线器便捷生成☆53Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆38Updated last year
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆45Updated last year
- Windows_AFD_LPE_CVE-2023-21768☆51Updated last year
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 3 years ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆47Updated last year
- Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shell☆40Updated 2 years ago
- ownCloud exploits for CVE-2023-49105☆36Updated last year
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 2 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆40Updated last year
- CVE-2023-21823 PoC☆14Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆111Updated 9 months ago
- CVE-2023-20198 & 0Day Implant Scanner☆30Updated 2 weeks ago
- Create Anti-Copy DRM Malware☆55Updated 8 months ago
- Windows shellcode encoding and encrypting tool☆21Updated 3 years ago
- User Mode Windows Rootkit☆61Updated last year
- https://docs.qwqdanchun.com/☆28Updated 3 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆52Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- PoC for CVE-2024-42327 / ZBX-25623☆18Updated 5 months ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago