☆14Jul 26, 2025Updated 7 months ago
Alternatives and similar repositories for Red-Teaming-Army
Users that are interested in Red-Teaming-Army are comparing it to the libraries listed below
Sorting:
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- ☆18Jan 12, 2026Updated last month
- ☆21Jan 8, 2026Updated last month
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- A PowerShell wrapper for certutil.exe☆20Feb 21, 2026Updated last week
- Cobalt Strike random C2 Profile generator☆16Feb 23, 2026Updated last week
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Custom mini tools during Red Teaming engagements☆23Jan 20, 2026Updated last month
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆43Jan 18, 2025Updated last year
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- ☆20Nov 6, 2023Updated 2 years ago
- ☆37Aug 6, 2025Updated 6 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago
- Utilities for creating Burp Suite Extensions.☆21Oct 31, 2024Updated last year
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22May 13, 2023Updated 2 years ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆65Dec 16, 2023Updated 2 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- Utilizng an MCP Server to communicate with your C2☆86May 15, 2025Updated 9 months ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 7 months ago
- A Windows Event Log MCP☆40Aug 25, 2025Updated 6 months ago
- A tool to grab session cookies of any website from an android phone and by-pass 2FA.☆11May 8, 2020Updated 5 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆228Mar 28, 2025Updated 11 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- ☆66Dec 24, 2021Updated 4 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 7 months ago
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- A collection of TUBs (Totally Useless Bambdas) for Burp Suite, created by Tib3rius & friends.☆32Sep 18, 2024Updated last year
- User-friendly reference finder in IDA☆39Dec 17, 2022Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago