DamonMohammadbagher / NativePayloadsLinks
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
☆231Updated 7 months ago
Alternatives and similar repositories for NativePayloads
Users that are interested in NativePayloads are comparing it to the libraries listed below
Sorting:
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆413Updated 11 months ago
- AV bypass while you sip your Chai!☆222Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆496Updated last year
- A shellcode injection tool showcasing various process injection techniques☆137Updated last year
- Kill AV/EDR leveraging BYOVD attack☆359Updated last year
- Awesome AV/EDR/XDR Bypass Tips☆272Updated 2 years ago
- COM Hijacking VOODOO☆298Updated 2 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆234Updated last year
- Terminate AV/EDR Processes using kernel driver☆344Updated last year
- Modules used by the Havoc Framework☆238Updated 11 months ago
- ☆164Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆558Updated 5 months ago
- Go shellcode loader that combines multiple evasion techniques☆370Updated last year
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆177Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆378Updated 10 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆607Updated 2 weeks ago
- Remote Shellcode Injector☆217Updated last year
- Amsi Bypass payload that works on Windwos 11☆377Updated last year
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆454Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆444Updated 2 weeks ago
- ☆218Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆302Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆378Updated 8 months ago
- ☆164Updated last year
- ☆333Updated 4 months ago
- transform your payload into ipv4/ipv6/mac arrays☆175Updated 2 years ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆283Updated last month
- Generate Shellcode Loaders & Injects☆155Updated 2 years ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆416Updated 10 months ago
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆443Updated 2 years ago