A guide to modern exploit development, shellcode, EDR and WAF bypass, and initial Red Team access.
☆27Mar 6, 2026Updated 2 months ago
Alternatives and similar repositories for Red-Teams
Users that are interested in Red-Teams are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 4 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆96Jan 2, 2026Updated 4 months ago
- Kali in a Box - Containerized and fully operational within your Browser☆13Nov 17, 2025Updated 5 months ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 3 months ago
- ☆47Feb 12, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆44Aug 6, 2025Updated 9 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 7 months ago
- Find private tracks on soundcloud by bruteforcing shareable links☆13Apr 24, 2024Updated 2 years ago
- One-header configurable C++20 COFF loader☆20Jul 21, 2025Updated 9 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆30Jul 19, 2025Updated 9 months ago
- Cobalt Strike BOF☆56Dec 10, 2025Updated 5 months ago
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆97Oct 17, 2025Updated 6 months ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆118Mar 6, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Plant Disease Prediction Using Deep Learning. (Graduation Project 2023) Bioinformatics, Faculty of Computer and Information Science at Ai…☆18Jun 5, 2025Updated 11 months ago
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆13Jun 3, 2025Updated 11 months ago
- 一个基于 Nostr 去中心的匿名远程控制工具 A decentralized anonymous remote control tool based on Nostr☆22Apr 14, 2025Updated last year
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆110Jan 18, 2026Updated 3 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆37Apr 16, 2024Updated 2 years ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 9 months ago
- Bof of RegPwn by MDSec☆118Mar 15, 2026Updated last month
- ☆37Jul 1, 2025Updated 10 months ago
- UDC2 implementation that provides an ICMP C2 channel☆124Nov 24, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 6 months ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 4 months ago
- Just another EDR killer☆137Jan 21, 2026Updated 3 months ago
- ☆26Aug 11, 2025Updated 9 months ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 11 months ago
- This project provides some code examples of Zig for malwares, hacking, and red teaming. ⚡☆211Oct 14, 2025Updated 6 months ago
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 11 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆28Nov 11, 2022Updated 3 years ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆142Dec 8, 2025Updated 5 months ago
- A cross-platform C++ framework for building Windows shellcode☆172Apr 21, 2026Updated 2 weeks ago
- Tiny C header that allows easy hiding of WinAPI imports via PEB☆46Sep 1, 2025Updated 8 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Things i do because i saw it on twitter on a weekend☆58Jul 20, 2025Updated 9 months ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆109Apr 16, 2026Updated 3 weeks ago