iDigitalFlame / Redteam-Toolbox
Red Teaming utilities that I can open source. Used in various tests and CTFS
☆11Updated 7 months ago
Alternatives and similar repositories for Redteam-Toolbox:
Users that are interested in Redteam-Toolbox are comparing it to the libraries listed below
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- inject and run code into arbitrary process (x86 and x64)☆12Updated 3 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆23Updated 2 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆12Updated last year
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆19Updated last year
- ☆12Updated 2 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆22Updated 3 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated last year
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆19Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- post exploitation user monitoring tool☆20Updated 6 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.☆13Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Caeser Cipher your shellcode!☆20Updated 3 years ago
- Non organized Cpp code files I used for my research on Windows☆18Updated 4 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆15Updated last year
- ☆24Updated 4 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Anti Sandbox Wrapper To Detect Sandboxes Such as Sandboxie, Cuckoo, Sunbelt, AnyRun, Hybrid-analysis, LastLine, Comodo, Avg, etc.☆13Updated 2 years ago