joey-melo / payloadsView external linksLinks
Payloads for AI Red Teaming and beyond
☆313Aug 28, 2025Updated 5 months ago
Alternatives and similar repositories for payloads
Users that are interested in payloads are comparing it to the libraries listed below
Sorting:
- OWASP Foundation web repository☆641Dec 23, 2025Updated last month
- ☆12Jun 26, 2023Updated 2 years ago
- ☆16Sep 9, 2025Updated 5 months ago
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆367Sep 20, 2025Updated 4 months ago
- A research project to add some brrrrrr to Burp☆197Feb 10, 2025Updated last year
- ☆12Feb 20, 2022Updated 3 years ago
- ☆16Oct 18, 2024Updated last year
- ☆43Aug 27, 2025Updated 5 months ago
- Automated Cloud Misconfiguration Testing☆23Jun 20, 2025Updated 7 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆20Nov 24, 2025Updated 2 months ago
- A community-driven collection of BloodHound queries☆160Jan 29, 2026Updated 2 weeks ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆51Mar 3, 2025Updated 11 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27May 13, 2025Updated 9 months ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 7 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆179May 28, 2025Updated 8 months ago
- Simple Project that Extracts PE Information.☆21Apr 4, 2025Updated 10 months ago
- ☆246Jul 31, 2024Updated last year
- An AWS IAM Privilege Escalation Path Library☆116Feb 2, 2026Updated last week
- Impacket with added MSSQL Relay server☆49Dec 30, 2025Updated last month
- AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.☆1,823Updated this week
- Blog/Journal on how to backdoor VSCode extensions☆76Updated this week
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆66Oct 17, 2023Updated 2 years ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 9 months ago
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 7 months ago
- Cloud subdomains identification tool☆62Apr 15, 2025Updated 10 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Apr 18, 2025Updated 9 months ago
- ☆761May 7, 2025Updated 9 months ago
- ☆618Feb 5, 2026Updated last week
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- ☆10Mar 11, 2024Updated last year
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆255Jan 29, 2026Updated 2 weeks ago