CyberSecurityUP / Windows-API-for-Red-Team
☆63Updated 11 months ago
Alternatives and similar repositories for Windows-API-for-Red-Team:
Users that are interested in Windows-API-for-Red-Team are comparing it to the libraries listed below
- ☆79Updated last month
- PowerShell Reverse Shell☆61Updated last year
- Dumping lsass without mimikatz with the exfiltration of the data using FAKE ntp packets☆79Updated this week
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 10 months ago
- ☆33Updated 3 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- ☆58Updated 5 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆54Updated 4 months ago
- POC of GITHUB simple C2 in rust☆54Updated last month
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆160Updated 3 months ago
- Repo for all my exploits/PoCs☆50Updated last month
- Situational Awareness script to identify how and where to run implants☆48Updated 3 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆45Updated 2 weeks ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 10 months ago
- A collection of Cobalt Strike Aggressor scripts.☆92Updated 3 years ago
- Lateral Movement☆123Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- Inject RDPThief into memory with PowerShell.☆61Updated 2 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆137Updated 7 months ago
- ☆60Updated last week
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 9 months ago
- My Favorite Offensive Security Scripts☆68Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆159Updated 3 months ago
- Malicious powershell scripts loader designed to avoid detection.☆49Updated last year
- List of some AD tools I frequently use☆46Updated last month