kira2040k / RedbloodC2Links
☆25Updated 2 years ago
Alternatives and similar repositories for RedbloodC2
Users that are interested in RedbloodC2 are comparing it to the libraries listed below
Sorting:
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated 11 months ago
- Cobalt Strike BOFS☆16Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆34Updated last year
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Quicky serve files over http or https using flask.☆35Updated 4 months ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 3 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆13Updated 8 months ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 8 months ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- ☆22Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆61Updated 6 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 11 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year