jhackz / RTO-Implant
Red Team Operator: Malware Development Essentials Course
☆98Updated 4 years ago
Alternatives and similar repositories for RTO-Implant:
Users that are interested in RTO-Implant are comparing it to the libraries listed below
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated last year
- ☆111Updated last year
- Simple APPLocker bypass summary☆40Updated 6 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- (kinda) Malicious Outlook Reader☆134Updated 4 years ago
- WNF Code Execution Library Using C#☆108Updated 4 years ago
- ☆47Updated 4 years ago
- ☆55Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆83Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆98Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆147Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆59Updated 6 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆42Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆90Updated 2 years ago
- Bypassing AppLocker with C#☆138Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆122Updated 3 years ago
- Simple EDR implementation to demonstrate bypass☆168Updated 4 years ago
- Code Exec via Excel☆86Updated 7 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆88Updated 9 months ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- Dump stuff without touching disk☆163Updated 4 years ago
- AMSI Bypass Via the Heap☆105Updated 4 years ago
- ☆136Updated last year