EvilWhales / Red-TeamsLinks
A guide to modern exploit development, shellcode, EDR and WAF bypass, and initial Red Team access.
☆20Updated last week
Alternatives and similar repositories for Red-Teams
Users that are interested in Red-Teams are comparing it to the libraries listed below
Sorting:
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 7 months ago
- Find jmp gadgets for call stack spoofing.☆69Updated 2 months ago
- Troll TaskManager, and play with it .☆28Updated 4 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆72Updated this week
- UAC Bypass using CMSTP in Rust☆33Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆74Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 3 months ago
- Enable EFS service as low priv user (PE & BOF)☆21Updated 5 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆132Updated 11 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆117Updated 3 weeks ago
- Obex – Blocking unwanted DLLs in user mode☆275Updated 2 months ago
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆34Updated 3 months ago
- A pointer encryption library intended for Red Team implant design in Rust.☆63Updated 2 months ago
- Cortex EDR Ransomware protection Bypass☆25Updated 10 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 4 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆60Updated 7 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆102Updated 9 months ago
- ☆34Updated 5 months ago
- BOF to decrypt Signal Desktop chat logs☆72Updated 9 months ago
- Generate an Alphabetical Polymorphic Shellcode☆132Updated 3 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆93Updated last week
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 5 months ago
- A unique introduction to native runtime obfuscation.☆74Updated 9 months ago
- A collection of position independent coding resources☆101Updated 3 weeks ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆80Updated 5 months ago
- A runas implementation with extra features in Rust☆51Updated 3 weeks ago
- Good CLR Host with Native patchless AMSI Bypass☆98Updated 7 months ago