R3DRUN3 / vermilionLinks
Linux post exploitation tool for info gathering and exfiltration π§π‘π
β89Updated last month
Alternatives and similar repositories for vermilion
Users that are interested in vermilion are comparing it to the libraries listed below
Sorting:
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ95Updated 8 months ago
- β62Updated 2 weeks ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.β86Updated 9 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ103Updated 2 years ago
- Enumerate active EDR's on the systemβ148Updated 3 months ago
- PoC that downloads an executable from a public SSL certificateβ135Updated 5 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays β all in a single command (14 output formats supporteβ¦β207Updated 3 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β121Updated 6 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β154Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movementβ181Updated 7 months ago
- Python alternative to Mimikatz lsadump::dcshadowβ155Updated 6 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploitβ49Updated 11 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ70Updated last year
- β74Updated 11 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ149Updated last year
- Inject RDPThief into memory with PowerShell.β65Updated 11 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraphβ61Updated last week
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one clickβ176Updated last month
- An interactive shell to spoof some LOLBins command lineβ187Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debuggingβ203Updated 9 months ago
- β86Updated 7 months ago