RedSiege / ChromatophoreLinks
Utilities for obfuscating shellcode
☆69Updated 3 months ago
Alternatives and similar repositories for Chromatophore
Users that are interested in Chromatophore are comparing it to the libraries listed below
Sorting:
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆139Updated 10 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆30Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated 2 months ago
- C++ Reflective Assembly Loader☆27Updated 3 months ago
- Living Off the Foreign Land setup scripts☆70Updated 4 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆117Updated 2 months ago
- OAuth Device Code Phishing Toolkit☆61Updated 2 months ago
- Adversary Emulation Framework☆114Updated 11 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 3 months ago
- Lifetime AMSI bypass.☆35Updated 2 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆82Updated 9 months ago
- ☆29Updated 9 months ago
- Your Skyfall Infrastructure Pack☆76Updated last month
- ☆137Updated last month
- A Python POC for CRED1 over SOCKS5☆149Updated 8 months ago
- pysnaffler☆101Updated 3 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago
- ☆70Updated 3 months ago
- Most Responder's configuration power in your hand.☆51Updated 5 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated last year
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆49Updated 4 months ago
- D/Invoke standalone shellcode runners☆39Updated last year
- Tiny and fast port scanner (Sliver edition)☆23Updated 3 months ago
- Deploy a phishing infrastructure on the fly.☆69Updated 6 months ago
- ☆118Updated 3 months ago