Idov31 / OffensiveRust
Rust Weaponization for Red Team Engagements.
☆11Updated 2 years ago
Alternatives and similar repositories for OffensiveRust:
Users that are interested in OffensiveRust are comparing it to the libraries listed below
- MacroExploit use in excel sheet☆20Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- ☆18Updated 4 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated last year
- ☆28Updated last year
- ☆27Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆21Updated last year
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Red Team Server (RTS)☆16Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- ☆25Updated last year
- Some good things for EXP-301 course☆11Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 8 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- ☆9Updated 3 weeks ago