mertdas / RedPersist
☆216Updated last year
Alternatives and similar repositories for RedPersist
Users that are interested in RedPersist are comparing it to the libraries listed below
Sorting:
- A Tool that aims to evade av with binary padding☆148Updated 10 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆239Updated 11 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆149Updated 7 months ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- Terminate AV/EDR Processes using kernel driver☆342Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆204Updated last year
- Evasive Golang Loader☆131Updated 9 months ago
- AV bypass while you sip your Chai!☆221Updated 11 months ago
- ☆163Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆207Updated last year
- Weaponized HellsGate/SigFlip☆199Updated last year
- ☆227Updated 6 months ago
- ☆332Updated 3 months ago
- Terminate AV/EDR leveraging BYOVD attack☆85Updated last month
- ☆225Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.☆234Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆126Updated last week
- Attempt at Obfuscated version of SharpCollection☆207Updated this week
- Escalate Service Account To LocalSystem via Kerberos☆395Updated last year
- Execute shellcode files with rundll32☆199Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.☆159Updated last year
- ErebusGate for Nim Bypass AV/EDR☆161Updated 2 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆135Updated 2 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆226Updated last year
- Credential Guard Bypass Via Patching Wdigest Memory☆323Updated 2 years ago
- Different methods to get current username without using whoami☆174Updated last year
- Fileless atexec, no more need for port 445☆377Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆408Updated 11 months ago