NexusFuzzy / redline_config
Tool to retrieve Config from Redline C2 servers
☆16Updated 2 years ago
Alternatives and similar repositories for redline_config:
Users that are interested in redline_config are comparing it to the libraries listed below
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆28Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆34Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- LNK-Dropper Builder☆21Updated 6 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- ☆26Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- LSTAR - CobaltStrike Translated to EN☆13Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆43Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆26Updated last year
- Cobalt Strike BOFS☆15Updated last year
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 6 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc …☆51Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 9 months ago
- Unhook Ntdll.dll, Go & C++.☆21Updated 8 months ago
- ☆54Updated 5 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆30Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆59Updated 3 months ago
- Simple Shellcode Loader tool☆25Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆68Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆35Updated last year
- Make an Linux Kernel rootkit visible again.☆49Updated last month
- EvtPsst☆53Updated last year