EvilBytecode / RubyRedOps
💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby
☆10Updated 3 weeks ago
Alternatives and similar repositories for RubyRedOps
Users that are interested in RubyRedOps are comparing it to the libraries listed below
Sorting:
- Unhook Ntdll.dll, Go & C++.☆22Updated 3 weeks ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆17Updated 3 weeks ago
- Ransomware written in go, encrypt - decrypt.☆20Updated 2 weeks ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆30Updated 3 weeks ago
- Proxy function calls through the thread pool with ease☆27Updated 2 months ago
- Threadless shellcode injection tool☆64Updated 9 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆37Updated this week
- Shellcode Loader Utilizing ETW Events☆63Updated 2 months ago
- converts sRDI compatible dlls to shellcode☆29Updated 3 months ago
- Parent Process ID Spoofing, coded in CGo.☆21Updated 3 weeks ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 9 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Updated 2 weeks ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆25Updated 6 months ago
- Ntdll Unhooking☆12Updated 2 weeks ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆35Updated this week
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- Windows C++ Implant for Exploration C2☆29Updated last month
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 3 weeks ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- ☆30Updated 4 months ago
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆13Updated last year
- Sniffing files generator☆56Updated 2 months ago
- ☆52Updated 4 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆77Updated 2 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- ☆58Updated 3 months ago
- Rewrite to fit my needs☆28Updated 9 months ago