kira2040k / RedbloodC2View external linksLinks
☆29May 19, 2023Updated 2 years ago
Alternatives and similar repositories for RedbloodC2
Users that are interested in RedbloodC2 are comparing it to the libraries listed below
Sorting:
- ☆12Jun 22, 2022Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- php7.4.26-internalog☆13Oct 13, 2022Updated 3 years ago
- Cumulus is web application weakness monitoring, works with just 3 code lines☆40Jan 27, 2023Updated 3 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- Collection of shellcode injection and execution techniques☆18Aug 21, 2025Updated 5 months ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Obfuscate and run .exe files in a powershell script☆17Apr 2, 2023Updated 2 years ago
- Nuclei Tamplates for APK☆22Jan 13, 2023Updated 3 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- Still point in moving world.☆49Oct 6, 2022Updated 3 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- ☆12Apr 8, 2022Updated 3 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 2 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆28Aug 24, 2023Updated 2 years ago
- Command & Control-Framework created for collaboration in python3☆322Aug 7, 2023Updated 2 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 2 months ago
- ☆113May 24, 2022Updated 3 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66May 1, 2023Updated 2 years ago
- Configuration security analyzer for network devices. Pynipper-ng is an evolution of nipper-ng, updated and translated to python. [ALPHA v…☆30Jan 15, 2026Updated last month
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Aug 29, 2021Updated 4 years ago
- EternalHush - java-based open-source c2 framework that targets Microsoft Windows☆27Updated this week
- DareDevil is a Cloner Tool. That Help You to Clone Different Varieties of Latest, Updated, Working Tools In One Click..☆10Nov 25, 2022Updated 3 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Oct 14, 2022Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Jul 27, 2022Updated 3 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Botnet Simulation Framework☆78Aug 6, 2020Updated 5 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆82Feb 2, 2026Updated 2 weeks ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- ☆38Jun 5, 2023Updated 2 years ago