R3DRUN3 / vermilion
Linux post exploitation tool for info gathering and exfiltration π§π‘π
β52Updated 3 weeks ago
Alternatives and similar repositories for vermilion:
Users that are interested in vermilion are comparing it to the libraries listed below
- β54Updated 2 months ago
- Simple C2 using GitHub repository as comms channel.β31Updated 3 months ago
- β57Updated 9 months ago
- β56Updated 3 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privilegesβ21Updated 2 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β60Updated 5 months ago
- A Moodle Scannerβ38Updated 2 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ143Updated 8 months ago
- Adversary Emulation Frameworkβ64Updated 6 months ago
- Exploit for the CVE-2024-5806β42Updated 7 months ago
- List of some AD tools I frequently useβ44Updated 4 months ago
- Inject RDPThief into memory with PowerShell.β58Updated last week
- Proof-of-Concept for CVE-2024-46538β46Updated 2 weeks ago
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated 11 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ54Updated last year
- β74Updated 2 weeks ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)β62Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β44Updated 10 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. οΏ½β¦β40Updated last year
- Lifetime AMSI bypass.β35Updated 7 months ago
- Source code and examples for PassiveAggressionβ54Updated 7 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstalβ¦β29Updated 2 months ago
- Most Responder's configuration power in your hand.β42Updated last week
- Automated .NET AppDomain hijack payload generationβ119Updated last month
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ79Updated last year
- Tool to extract username and password of current user from PanGPA in plaintextβ81Updated last month
- RCE PoC for Empire C2 framework <5.9.3β26Updated 11 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSLβ39Updated 8 months ago