R3DRUN3 / vermilionLinks
Linux post exploitation tool for info gathering and exfiltration π§π‘π
β89Updated last week
Alternatives and similar repositories for vermilion
Users that are interested in vermilion are comparing it to the libraries listed below
Sorting:
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β118Updated 5 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.β87Updated 8 months ago
- PoC that downloads an executable from a public SSL certificateβ131Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ94Updated 7 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debuggingβ203Updated 8 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated last year
- Enumerate active EDR's on the systemβ146Updated last month
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β154Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ148Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ101Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays β all in a single command (14 output formats supporteβ¦β195Updated 2 months ago
- β62Updated last year
- An interactive shell to spoof some LOLBins command lineβ187Updated last year
- β59Updated 6 months ago
- Convert your shellcode into an ASCII stringβ125Updated 4 months ago
- Our Tips&Tricksβ127Updated 9 months ago
- Repo for all my exploits/PoCsβ53Updated 6 months ago
- β73Updated 9 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraphβ61Updated this week
- β164Updated 6 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.β300Updated this week
- Remote DLL Injection with Timer-based Shellcode Executionβ151Updated 4 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movementβ179Updated 6 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.β38Updated 7 months ago
- Python alternative to Mimikatz lsadump::dcshadowβ155Updated 4 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploitβ48Updated 10 months ago
- β78Updated 6 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPCβ118Updated 5 months ago
- PowerShell script to generate ShellCode in various formatsβ43Updated last year