RITRedteam / SangheiliLinks
Custom SOCKS proxy for redteam
☆12Updated 3 years ago
Alternatives and similar repositories for Sangheili
Users that are interested in Sangheili are comparing it to the libraries listed below
Sorting:
- Track your beacons in a redteam scoreboard☆15Updated 5 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- Deploy redteam infrastructure☆17Updated 4 years ago
- ☆27Updated 4 years ago
- Some of my custom "tools".☆29Updated 3 years ago
- In 'n Out - See what goes in and comes out of PEs☆35Updated 3 years ago
- ☆39Updated 4 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Updated 3 years ago
- A C port of b33f's UrbanBishop☆38Updated 5 years ago
- pypykatz plugin for volatility3 framework☆44Updated 6 months ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- ☆60Updated 4 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 4 years ago
- Caesar-Cipher based encryption☆31Updated 4 years ago
- ☆13Updated last year
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Updated 4 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 4 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago
- Smart Card PIN swiping DLL☆78Updated 5 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Updated 4 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago