R3DRUN3 / vermilionView external linksLinks
Linux post exploitation tool for info gathering and exfiltration π§π‘π
β91Nov 13, 2025Updated 3 months ago
Alternatives and similar repositories for vermilion
Users that are interested in vermilion are comparing it to the libraries listed below
Sorting:
- Two in one, patch lifetime powershell console, no more etw and amsi!β103Apr 27, 2025Updated 9 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.β82Jun 25, 2025Updated 7 months ago
- π΄ββ οΈ Hacking Guides, Demos and Proof-of-Concepts π₯·β219Sep 4, 2025Updated 5 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.β39Sep 29, 2025Updated 4 months ago
- Stage 0β169Dec 18, 2024Updated last year
- This repository is to provide a write-up and PoC for CVE-2023-41717.β12Aug 31, 2023Updated 2 years ago
- β12Dec 15, 2024Updated last year
- A python script that automates a C2 Profile buildβ48Dec 14, 2025Updated 2 months ago
- Exploit for CVE-2024-0402 in Gitlabβ15Mar 18, 2025Updated 10 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β197Nov 5, 2025Updated 3 months ago
- Indirect Syscall with TartarusGate Approach in Goβ134Jul 8, 2025Updated 7 months ago
- ε ζζ¨ι©¬ζ ·ζ¬β102Oct 11, 2025Updated 4 months ago
- POC of GITHUB simple C2 in rustβ52Jul 27, 2025Updated 6 months ago
- Impersonate Tokens using only NTAPI functionsβ83Apr 4, 2025Updated 10 months ago
- single-threaded event driven sleep obfuscation poc for linuxβ37Jun 14, 2025Updated 8 months ago
- Purple-team telemetry & simulation toolkit.β107Dec 16, 2025Updated last month
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.ioβ¦β25Mar 31, 2022Updated 3 years ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCEβ200Nov 12, 2024Updated last year
- β18Feb 29, 2024Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.β19Apr 6, 2024Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, fβ¦β167May 30, 2024Updated last year
- π An up-to-date collection of precompiled binaries and hacking scripts.β47Feb 1, 2026Updated 2 weeks ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatinβ¦β121Jan 15, 2025Updated last year
- Rust implementation, creating a scheduled task programmatically with user logon trigger.β47Jun 10, 2025Updated 8 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)β195Feb 6, 2025Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functionsβ266Apr 8, 2025Updated 10 months ago
- Python implementation of GhostPack's Seatbelt situational awareness toolβ270Nov 12, 2024Updated last year
- Early Bird APC Injection in Rustβ63Oct 9, 2024Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-buiβ¦β231Feb 12, 2025Updated last year
- β53Mar 26, 2025Updated 10 months ago
- External recon toolkitβ54Dec 29, 2024Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcpβ77Jan 24, 2026Updated 3 weeks ago
- β106Aug 21, 2024Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ125Dec 2, 2023Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails cβ¦β166Oct 9, 2024Updated last year
- β50Apr 9, 2025Updated 10 months ago
- Tool to remotely dump secrets from the Windows registryβ522Nov 18, 2025Updated 2 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.β97Oct 7, 2024Updated last year
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation fβ¦β220Jun 4, 2024Updated last year