RedSiege / ChromatophoreLinks
Utilities for obfuscating shellcode
☆69Updated 4 months ago
Alternatives and similar repositories for Chromatophore
Users that are interested in Chromatophore are comparing it to the libraries listed below
Sorting:
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆142Updated 11 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆50Updated 4 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆83Updated 10 months ago
- tool for requesting Entra ID's P2P certificate and authenticating remote Entra joinned devices with it☆114Updated last month
- ☆70Updated 4 months ago
- OAuth Device Code Phishing Toolkit☆63Updated 2 months ago
- Most Responder's configuration power in your hand.☆51Updated 5 months ago
- A Python POC for CRED1 over SOCKS5☆151Updated 9 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated 2 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆31Updated 6 months ago
- Adversary Emulation Framework☆120Updated 2 weeks ago
- Situational Awareness script to identify how and where to run implants☆54Updated 7 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆56Updated 5 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆37Updated 3 weeks ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated 11 months ago
- A python script that automates a C2 Profile build☆42Updated 3 months ago
- Sliver extension to bypass UAC via cmstp written in rust☆29Updated last year
- Lifetime AMSI bypass.☆35Updated 2 months ago
- ☆140Updated 2 months ago
- Your Skyfall Infrastructure Pack☆76Updated last month
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆93Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Sniffing files generator☆59Updated 4 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago