EvilBytecode / RubyRedOpsLinks
š | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby
ā10Updated 9 months ago
Alternatives and similar repositories for RubyRedOps
Users that are interested in RubyRedOps are comparing it to the libraries listed below
Sorting:
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.ā50Updated 8 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsassā165Updated 4 months ago
- A mutliple tactics to execute shellcode in go :}ā23Updated 9 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniquesā89Updated 5 months ago
- Early Bird Cryo Injections ā APC-based DLL & Shellcode Injection via Pre-Frozen Job Objectsā135Updated 10 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified ā¦ā18Updated 8 months ago
- Ransomware written in go, encrypt - decrypt.ā29Updated 9 months ago
- Shellcode loaderā100Updated last year
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryptionā190Updated last month
- BOF with Synthetic Stackframeā219Updated 3 months ago
- Good CLR Host with Native patchless AMSI Bypassā101Updated 9 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dllā135Updated 9 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.ā81Updated 7 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, pā¦ā195Updated last month
- Generate an Alphabetical Polymorphic Shellcodeā135Updated 5 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.ā166Updated 8 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.ā83Updated last year
- Threadless shellcode injection toolā68Updated last year
- ā54Updated 3 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)ā195Updated last year
- ā145Updated 3 months ago
- Classic Process Injection with Memory Evasion Techniques implemantationā72Updated 2 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.ā101Updated last year
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+Sā¦ā113Updated last month
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.ā90Updated 9 months ago
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBinā121Updated last month
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible iā¦ā61Updated 10 months ago
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strikeā181Updated 3 months ago
- converts sRDI compatible dlls to shellcodeā35Updated last year
- ApexLdr is a DLL Payload Loader written in Cā116Updated last year