RedSiege / ChromatophoreLinks
Utilities for obfuscating shellcode
☆86Updated 5 months ago
Alternatives and similar repositories for Chromatophore
Users that are interested in Chromatophore are comparing it to the libraries listed below
Sorting:
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆89Updated 11 months ago
- Adversary Emulation Framework☆122Updated 2 months ago
- Situational Awareness script to identify how and where to run implants☆61Updated 8 months ago
- OAuth Device Code Phishing Toolkit☆84Updated 4 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆124Updated last week
- Two in one, patch lifetime powershell console, no more etw and amsi!☆97Updated 4 months ago
- ☆70Updated 5 months ago
- A Python POC for CRED1 over SOCKS5☆154Updated 10 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 5 months ago
- Lifetime AMSI bypass.☆35Updated 4 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- ☆145Updated 3 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆53Updated 6 months ago
- Decrypt GlobalProtect configuration and cookie files.☆150Updated 11 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆161Updated last month
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Your Skyfall Infrastructure Pack☆76Updated 2 weeks ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆98Updated this week
- A small How-To on creating your own weaponized WSL file☆113Updated last month
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 8 months ago
- A python script that automates a C2 Profile build☆43Updated 5 months ago
- Fast context enumeration for newly obtained Active Directory credentials.☆55Updated 2 weeks ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆60Updated 2 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆215Updated last week
- IPSpinner works as a local proxy that redirects requests through external services.☆72Updated 5 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆39Updated 2 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆32Updated 7 months ago