Suredials / RUSTVERSARYLinks
π¦ RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.
β30Updated last year
Alternatives and similar repositories for RUSTVERSARY
Users that are interested in RUSTVERSARY are comparing it to the libraries listed below
Sorting:
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.β139Updated 10 months ago
- Sliver CheatSheet for OSEPβ242Updated 2 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.β173Updated last month
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloβ¦β215Updated 3 months ago
- β238Updated 10 months ago
- collection of blogs about malware development and analysisβ63Updated 2 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.β311Updated last month
- The different ways to dump lsassβ236Updated 5 months ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.β165Updated 2 years ago
- A guide to learning antivirus evasionβ62Updated 10 months ago
- β164Updated 11 months ago
- RunPE implementation with multiple evasive techniques (2)β268Updated 4 months ago
- execute PE in memory Filelesslyβ50Updated last year
- Certified Red Team Operator (CRTO) Cheatsheet and Checklistβ208Updated last year
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.β12Updated 8 months ago
- A list of all Active Directory machines from HackTheBoxβ212Updated 2 weeks ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defenderβ29Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !β106Updated 2 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enuβ¦β110Updated 7 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI databaseβ260Updated 3 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution typesβ111Updated 5 months ago
- Polymorphic Command & Controlβ102Updated 11 months ago
- β96Updated last year
- Obfuscate the bytes of your payload with an association dictionaryβ75Updated 3 months ago
- Two simple plugins for wireshark that can help in Network Forensics CTFsβ12Updated 9 months ago
- Everything from my OSEP study.β186Updated last month
- A Rust implementation of Internal-Monologue β retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and β¦β191Updated 9 months ago
- EDR & Antivirus Bypass to Gain Shell Accessβ246Updated last year
- Cybersecurity blog. Red Team, pentest, malware analysis and devβ98Updated this week
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β152Updated last year