REW-sploit / REW-sploit
Emulate and Dissect MSF and *other* attacks
☆137Updated 6 months ago
Related projects: ⓘ
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆127Updated last year
- ☆117Updated last year
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆262Updated 4 months ago
- Bypassing AppLocker with C#☆136Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆230Updated 2 years ago
- Load any Beacon Object File using Powershell!☆245Updated 2 years ago
- ☆94Updated 3 years ago
- Bring your own print driver privilege escalation tool☆241Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆170Updated 2 weeks ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆162Updated last year
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆174Updated last year
- Koppeling x Metatwin x LazySign☆200Updated 3 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago
- Simple rapper for Mimikatz, bypass Defender☆139Updated 2 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆214Updated last year
- ☆200Updated 2 years ago
- ☆161Updated last year
- Simple EDR implementation to demonstrate bypass☆152Updated 4 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆178Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆224Updated 2 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆177Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- ☆130Updated this week
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆190Updated last year
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 2 years ago
- Loads a custom dll in system32 via diaghub.☆64Updated 4 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆152Updated last year
- ☆71Updated 2 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆142Updated 3 years ago
- (kinda) Malicious Outlook Reader☆132Updated 3 years ago