CyberSecurityUP / Windows-API-for-Red-Team
☆55Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for Windows-API-for-Red-Team
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆108Updated last month
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆88Updated last month
- PowerShell Reverse Shell☆61Updated last year
- Lateral Movement☆119Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆80Updated 4 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- vulnlab.com reaper writeup☆26Updated last year
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆102Updated 3 weeks ago
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- Source code and examples for PassiveAggression☆54Updated 5 months ago
- List of some AD tools I frequently use☆43Updated last month
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 11 months ago
- ☆92Updated 8 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆69Updated 9 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 6 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆43Updated 6 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆133Updated 3 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆57Updated 5 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆78Updated 7 months ago
- C2 Infrastructure Automation☆86Updated last week
- ☆51Updated 9 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆42Updated 9 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated 11 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆163Updated last month