☆106Nov 10, 2023Updated 2 years ago
Alternatives and similar repositories for RedWizard
Users that are interested in RedWizard are comparing it to the libraries listed below
Sorting:
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Infrastructure Automation☆356Apr 12, 2024Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Jun 25, 2024Updated last year
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 7 months ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- EDRSandblast-GodFault☆271Aug 28, 2023Updated 2 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆362Jan 29, 2026Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Dec 1, 2025Updated 3 months ago
- ☆49Apr 9, 2025Updated 10 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- Quick and dirty dynamic redirect.rules generator☆170Oct 12, 2022Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- ☆123Oct 9, 2023Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- ☆152Oct 2, 2023Updated 2 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- string encryption in Nim☆20Jun 15, 2024Updated last year
- ☆190Nov 21, 2024Updated last year
- ☆46Jun 21, 2023Updated 2 years ago