EvilWhales / Red-TeamsLinks
A guide to modern exploit development, shellcode, EDR and WAF bypass, and initial Red Team access.
☆23Updated 2 weeks ago
Alternatives and similar repositories for Red-Teams
Users that are interested in Red-Teams are comparing it to the libraries listed below
Sorting:
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 7 months ago
- UAC Bypass using CMSTP in Rust☆35Updated last year
- AppLocker-Based EDR Neutralization☆238Updated 2 weeks ago
- Troll TaskManager, and play with it .☆29Updated 5 months ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Updated 4 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆104Updated 5 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆97Updated last month
- Find jmp gadgets for call stack spoofing.☆72Updated 3 months ago
- A python script that automates a C2 Profile build☆48Updated 3 weeks ago
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- Cortex EDR Ransomware protection Bypass☆25Updated 11 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 4 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆124Updated 3 weeks ago
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆35Updated 4 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆74Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆83Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 7 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Updated last week
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆100Updated 5 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆134Updated 6 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 6 months ago
- Good CLR Host with Native patchless AMSI Bypass☆97Updated 8 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆61Updated last year
- ☆139Updated 2 months ago
- Enable EFS service as low priv user (PE & BOF)☆21Updated 6 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 7 months ago
- Prevent in-process process termination by patching exit APIs☆62Updated last month
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Updated last year
- ☆55Updated last week