Collection of red team techniques.
☆69Apr 25, 2025Updated 10 months ago
Alternatives and similar repositories for redteam-techniques
Users that are interested in redteam-techniques are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆105Feb 25, 2025Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆66Mar 1, 2025Updated last year
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 9 months ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆264Aug 31, 2025Updated 6 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆65Mar 19, 2024Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Oct 30, 2024Updated last year
- In-memory hiding technique☆63Jan 5, 2025Updated last year
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- Collect Windows telemetry for Maldev☆464Jan 30, 2026Updated last month
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- ☆87Jan 21, 2025Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 4 months ago
- An example reference design for a proposed BOF PE☆204Jan 23, 2026Updated 2 months ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆343Oct 7, 2024Updated last year
- BOF with Synthetic Stackframe☆235Oct 30, 2025Updated 4 months ago
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆125Jul 11, 2025Updated 8 months ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 2 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- Position-independent Reflective Loader for macOS☆120Feb 19, 2026Updated last month
- Shellcode loader written in C and Assembly utilizing direct or indirect syscalls to evade UM EDR hooks☆139Dec 22, 2024Updated last year
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆43Jan 9, 2025Updated last year