p4yl0ad / redLinks
Collection of things used for Labs and Certifications that are useful stored in one place
☆5Updated 3 years ago
Alternatives and similar repositories for red
Users that are interested in red are comparing it to the libraries listed below
Sorting:
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆19Updated 2 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆95Updated last year
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆62Updated 5 years ago
- python spraying tools based on impacket lib☆53Updated 2 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆33Updated 2 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Extra cmdlets to help with quering security related information from Azure☆13Updated 10 months ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Simple APPLocker bypass summary☆43Updated 6 years ago
- Simple tool to perform HTML Smuggling.☆68Updated 3 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆129Updated 3 years ago
- Tools I use on red team engagements and more☆33Updated last year
- ☆120Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 3 months ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Get Fine Grained Password Policy☆70Updated 3 months ago
- D/Invoke standalone shellcode runners☆39Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆152Updated 2 years ago
- cobalt strike tools☆31Updated 3 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆123Updated 3 years ago
- Random☆34Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆103Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Updated last year
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Updated last year