☆19Dec 18, 2024Updated last year
Alternatives and similar repositories for VladimiRED
Users that are interested in VladimiRED are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- ☆16Dec 7, 2025Updated 5 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- ☆16Jan 9, 2025Updated last year
- A simple to use single-include Windows API resolver☆22Jul 9, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago
- Execute shellcode via Bluetooth device authentication☆41Feb 19, 2025Updated last year
- Decrypt encrypted SonicOSX firmware images☆19Feb 24, 2025Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆104Jul 9, 2025Updated 9 months ago
- Repo hacks☆21Dec 7, 2025Updated 5 months ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆129Jan 17, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ForsHops☆154Mar 25, 2025Updated last year
- ☆38Apr 15, 2025Updated last year
- Swiss army knife for payload encryption and obfuscation☆30Jan 22, 2024Updated 2 years ago
- ☆34Mar 19, 2025Updated last year
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 11 months ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- AI-based implant feature☆25Apr 28, 2025Updated last year
- ☆147Nov 6, 2025Updated 6 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆53Feb 4, 2025Updated last year
- ☆132Jan 23, 2025Updated last year
- Addon for BHCE☆57Apr 1, 2025Updated last year
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated 2 years ago
- A service container for interacting with SRA's VECTR☆17Apr 9, 2025Updated last year
- ☆22Sep 25, 2022Updated 3 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆17Mar 13, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆93May 24, 2025Updated 11 months ago
- ☆32Dec 5, 2024Updated last year
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆170Nov 17, 2025Updated 5 months ago
- ☆139Nov 17, 2025Updated 5 months ago
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 6 months ago
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 7 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆39Aug 8, 2025Updated 8 months ago