This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.
☆49Jul 25, 2023Updated 2 years ago
Alternatives and similar repositories for jarm_randomizer
Users that are interested in jarm_randomizer are comparing it to the libraries listed below
Sorting:
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated 11 months ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆114Aug 23, 2021Updated 4 years ago
- shadow tls client☆14Dec 30, 2022Updated 3 years ago
- ☆101Oct 7, 2023Updated 2 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆102Jan 7, 2022Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Aug 6, 2021Updated 4 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Sep 8, 2022Updated 3 years ago
- ☆537Feb 26, 2026Updated last week
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Aug 4, 2021Updated 4 years ago
- ☆451Aug 4, 2021Updated 4 years ago
- Initial Commit of Coresploit☆57Oct 12, 2021Updated 4 years ago
- ☆84Aug 26, 2024Updated last year
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- The code is a pingback to the Dark Vortex blog:☆186Jan 26, 2023Updated 3 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Apr 20, 2021Updated 4 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Process Hollowing☆12Sep 13, 2017Updated 8 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 9 months ago
- ☆11Jul 11, 2023Updated 2 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆49Apr 22, 2017Updated 8 years ago
- ☆1,131Dec 19, 2023Updated 2 years ago
- A cross-platform implant written in Nim☆175Mar 6, 2024Updated 2 years ago
- ☆180Feb 3, 2021Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Infect Shared Files In Memory for Lateral Movement☆193Dec 14, 2022Updated 3 years ago
- proxyshell payload generate☆75Aug 14, 2021Updated 4 years ago
- ☆153Jan 6, 2023Updated 3 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- fast-scanner can make it easy for you to develop scanners☆12Jun 8, 2020Updated 5 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 8 months ago
- x64 Registration-Free In-Process COM Automation Server.☆51Nov 28, 2022Updated 3 years ago
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 5 months ago