EvilBytecode / RubyRedOpsLinks
π | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby
β10Updated 2 months ago
Alternatives and similar repositories for RubyRedOps
Users that are interested in RubyRedOps are comparing it to the libraries listed below
Sorting:
- Unhook Ntdll.dll, Go & C++.β24Updated 2 months ago
- Ntdll Unhookingβ12Updated 2 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.β34Updated last month
- Shellcode Loader Utilizing ETW Eventsβ63Updated 4 months ago
- converts sRDI compatible dlls to shellcodeβ29Updated 5 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to neβ¦β18Updated last month
- Indirect Syscall implementation to bypass userland NTAPIs hooking.β73Updated 10 months ago
- Threadless shellcode injection toolβ65Updated 10 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.β52Updated 2 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system cβ¦β24Updated 9 months ago
- Ransomware written in go, encrypt - decrypt.β25Updated last month
- β55Updated 8 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZβ42Updated 2 years ago
- Section-based payload obfuscation technique for x64β61Updated 10 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binariesβ30Updated 4 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.β19Updated 2 months ago
- ATL.dll and WmiMgmt.msc UAC Bypassβ12Updated 2 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.β61Updated last year
- Proxy function calls through the thread pool with easeβ28Updated 3 months ago
- A mutliple tactics to execute shellcode in go :}β20Updated 2 months ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.β20Updated 2 months ago
- Classic Process Injection with Memory Evasion Techniques implemantationβ70Updated last year
- Lsass dumper evading (some) EDR detectionβ25Updated 4 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.β35Updated 3 months ago
- Encode shellcode into dictionary words for evasion and entropy reductionβ26Updated 7 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loaderβ40Updated 9 months ago
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ45Updated last year
- Cortex EDR Ransomware protection Bypassβ24Updated 4 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)β54Updated 5 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.β82Updated 4 months ago