netskopeoss / jarm_randomizerView external linksLinks
This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.
☆49Jul 25, 2023Updated 2 years ago
Alternatives and similar repositories for jarm_randomizer
Users that are interested in jarm_randomizer are comparing it to the libraries listed below
Sorting:
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated 10 months ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆114Aug 23, 2021Updated 4 years ago
- shadow tls client☆14Dec 30, 2022Updated 3 years ago
- ☆100Oct 7, 2023Updated 2 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆102Jan 7, 2022Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Aug 6, 2021Updated 4 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆148Sep 8, 2022Updated 3 years ago
- ☆536Feb 3, 2026Updated last week
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Aug 4, 2021Updated 4 years ago
- ☆452Aug 4, 2021Updated 4 years ago
- Initial Commit of Coresploit☆57Oct 12, 2021Updated 4 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- ☆83Aug 26, 2024Updated last year
- The code is a pingback to the Dark Vortex blog:☆187Jan 26, 2023Updated 3 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Apr 20, 2021Updated 4 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- ☆11Jul 11, 2023Updated 2 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Apr 22, 2017Updated 8 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Process Hollowing☆12Sep 13, 2017Updated 8 years ago
- ☆1,129Dec 19, 2023Updated 2 years ago
- ☆180Feb 3, 2021Updated 5 years ago
- A cross-platform implant written in Nim☆175Mar 6, 2024Updated last year
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Infect Shared Files In Memory for Lateral Movement☆196Dec 14, 2022Updated 3 years ago
- proxyshell payload generate☆75Aug 14, 2021Updated 4 years ago
- ☆152Jan 6, 2023Updated 3 years ago
- fast-scanner can make it easy for you to develop scanners☆12Jun 8, 2020Updated 5 years ago
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 4 months ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago
- x64 Registration-Free In-Process COM Automation Server.☆51Nov 28, 2022Updated 3 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 7 months ago
- Coerce Windows machines auth via MS-EVEN☆171Jan 17, 2024Updated 2 years ago