kyle41111 / RedTeamHelpLinks
Tools I use on red team engagements and more
☆33Updated last year
Alternatives and similar repositories for RedTeamHelp
Users that are interested in RedTeamHelp are comparing it to the libraries listed below
Sorting:
- Find .net assemblies locally☆117Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆142Updated 11 months ago
- Utilities for obfuscating shellcode☆69Updated 4 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- A Python POC for CRED1 over SOCKS5☆151Updated 9 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆99Updated last week
- ☆132Updated 5 months ago
- ☆111Updated 7 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated 2 months ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆98Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆83Updated 10 months ago
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆66Updated 6 months ago
- D/Invoke standalone shellcode runners☆39Updated last year
- Impacket pre-compiled binaries☆16Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆137Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆31Updated 6 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆95Updated last year
- C# havoc implant☆101Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- Your syscall factory☆123Updated 3 weeks ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆51Updated this week
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Lateral Movement via the .NET Profiler☆82Updated 7 months ago
- Lateral Movement☆124Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- ☆107Updated 5 months ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- Simple BOF to read the protection level of a process☆115Updated 2 years ago
- ☆113Updated 3 months ago