R3DRUN3 / vermilionLinks
Linux post exploitation tool for info gathering and exfiltration π§π‘π
β88Updated last month
Alternatives and similar repositories for vermilion
Users that are interested in vermilion are comparing it to the libraries listed below
Sorting:
- PoC that downloads an executable from a public SSL certificateβ128Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.β87Updated 6 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ93Updated 5 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β62Updated last year
- β61Updated 11 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ99Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β152Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploitβ47Updated 8 months ago
- Repo for all my exploits/PoCsβ52Updated 4 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β107Updated 3 months ago
- β68Updated 7 months ago
- An interactive shell to spoof some LOLBins command lineβ186Updated last year
- β162Updated 4 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debuggingβ198Updated 6 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatinβ¦β115Updated 8 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ148Updated last year
- Python alternative to Mimikatz lsadump::dcshadowβ151Updated 2 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcpβ67Updated 2 weeks ago
- PowerShell script to generate ShellCode in various formatsβ43Updated 11 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β79Updated last year
- Convert your shellcode into an ASCII stringβ114Updated 2 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)β72Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.β36Updated 5 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575β89Updated 10 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movementβ177Updated 4 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β153Updated last year
- β59Updated 10 months ago
- β80Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike β a Go-based tool for ethical hacking and Red Team operationβ¦β188Updated last year