Teach2Breach / Red_Team_RustLinks
Collection of Rust repos useful for Red Teamers.
☆34Updated 2 years ago
Alternatives and similar repositories for Red_Team_Rust
Users that are interested in Red_Team_Rust are comparing it to the libraries listed below
Sorting:
- ☆47Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Updated 2 years ago
- ☆24Updated last year
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆62Updated 3 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated 8 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated last year
- ☆57Updated 10 months ago
- Python module for running BOFs☆72Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆40Updated last year
- maldev obviously☆27Updated 4 months ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆43Updated last year
- ☆59Updated last year
- Linux Sleep Obfuscation☆105Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆84Updated last year
- Shellcode reflective DLL injection in Rust☆24Updated 2 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- idk man this was the default github name☆35Updated 2 years ago
- An In-memory Embedding of CPython☆30Updated 4 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- ☆37Updated last year
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆75Updated 2 years ago
- ☆41Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆86Updated 2 years ago
- ☆48Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆73Updated 5 months ago