padovah4ck / RedSharp
Penetration Test / Read Team - C# tools repository
☆57Updated 3 years ago
Alternatives and similar repositories for RedSharp:
Users that are interested in RedSharp are comparing it to the libraries listed below
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- A C# DLL to Dump LSA Secrets☆57Updated 7 years ago
- Automate AV evasion by calling AMSI☆87Updated last year
- Credential Dumper☆76Updated 5 years ago
- ☆46Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆74Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆77Updated 4 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated last year
- ☆68Updated 4 years ago
- ☆42Updated 5 years ago
- Suite of Shellcode Running Utilities☆109Updated 5 years ago
- medium-rare☆28Updated 5 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- Various C# projects for offensive security☆109Updated 5 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- ☆76Updated 6 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆58Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆70Updated 4 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- adding a backdooruser using win32api☆80Updated 4 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- Port of Invoke-Excel4DCOM☆103Updated 5 years ago
- ☆70Updated 6 years ago
- ☆94Updated 6 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Initial Commit of Coresploit☆56Updated 3 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 3 years ago