RITRedteam / Sangheili
Custom SOCKS proxy for redteam
☆12Updated 3 years ago
Alternatives and similar repositories for Sangheili:
Users that are interested in Sangheili are comparing it to the libraries listed below
- Track your beacons in a redteam scoreboard☆15Updated 4 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆17Updated 3 years ago
- Deploy redteam infrastructure☆16Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Updated 3 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Updated 5 years ago
- Some of my custom "tools".☆22Updated 3 years ago
- ☆30Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated 2 years ago
- C2 over web☆8Updated 5 years ago
- Walking the PEB in VBA☆22Updated 4 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- ELF Beacon Object File (BOF) Template☆18Updated 4 months ago
- Helpful operator notes and techniques in actionable form☆16Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- DLL Injector as a service that watches the health of the started thread.☆9Updated 5 years ago
- terraform deployment for red team☆22Updated 2 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆35Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- ☆37Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆29Updated 3 years ago
- ☆13Updated last year