The Red Sun vulnerability repository
☆1,345Apr 15, 2026Updated this week
Alternatives and similar repositories for RedSun
Users that are interested in RedSun are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆43Feb 12, 2026Updated 2 months ago
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆74Mar 7, 2026Updated last month
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆121Mar 30, 2026Updated 2 weeks ago
- Resolve offsets, gadgets and symbols from NTKernel☆60Jan 15, 2026Updated 3 months ago
- Repository hosting the bluehammer vulnerability☆1,036Apr 9, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Local Privilege Escalation Affecting Millions of Gaming Laptops☆63Jan 19, 2026Updated 3 months ago
- Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by …☆154Apr 10, 2026Updated last week
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export support☆68Mar 26, 2026Updated 3 weeks ago
- KrbRoastParser is a tool for parsing Kerberos packets from pcap files to extract AS-REQ, AS-REP and TGS-REP hashes☆98Mar 26, 2026Updated 3 weeks ago
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆185Mar 4, 2026Updated last month
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆127Jan 29, 2026Updated 2 months ago
- A Crystal Palace shared library to resolve & perform syscalls☆59Oct 29, 2025Updated 5 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆41Aug 5, 2025Updated 8 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆157Feb 14, 2026Updated 2 months ago
- ☆19May 1, 2025Updated 11 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆287Apr 8, 2026Updated last week
- A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.☆133Updated this week
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 2 months ago
- ☆19Sep 1, 2025Updated 7 months ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- PowerShell implementation for AD CS☆120Mar 2, 2026Updated last month
- ☆43Updated this week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Gopacket is a clean Go implementation of Impacket, a library intended for working with network protocols.☆363Updated this week
- ☆19Dec 18, 2024Updated last year
- ☆59Feb 19, 2026Updated 2 months ago
- A vulnerability has been identified in Docker Desktop. A remote attacker could exploit this vulnerability to trigger security restriction…☆48Dec 7, 2025Updated 4 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 7 months ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆274Jun 18, 2025Updated 10 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆68Jan 5, 2026Updated 3 months ago
- vm_str.hpp is a header only string obfuscator.☆112Aug 24, 2025Updated 7 months ago
- Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specific…☆127Updated this week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repository provides a dockerized infrastructure and a python implementation of the CVE-2019-11043 exploit.☆14May 25, 2020Updated 5 years ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆191Jan 17, 2026Updated 3 months ago
- EDR-Freeze is a tool that puts a process of EDR, AntiMalware into a coma state.☆825Nov 1, 2025Updated 5 months ago
- Rust Based PE & Shellcode Packer☆42Dec 28, 2025Updated 3 months ago
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 2 months ago
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆122Mar 27, 2026Updated 3 weeks ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024☆11Apr 28, 2024Updated last year