padovah4ck / RedSharp
Penetration Test / Read Team - C# tools repository
☆57Updated 3 years ago
Alternatives and similar repositories for RedSharp:
Users that are interested in RedSharp are comparing it to the libraries listed below
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated last year
- A C# DLL to Dump LSA Secrets☆57Updated 7 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- Automate AV evasion by calling AMSI☆87Updated last year
- medium-rare☆28Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆58Updated 5 years ago
- Credential Dumper☆76Updated 5 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 5 years ago
- ☆46Updated 4 years ago
- .Net Assembly to block ETW telemetry in current process☆78Updated 4 years ago
- ☆46Updated 3 years ago
- testing123☆11Updated 4 months ago
- ☆76Updated 6 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆70Updated 4 years ago
- Various C# projects for offensive security☆109Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆74Updated 5 years ago
- F# Implementation to spawn shellcode☆46Updated 6 years ago
- Suite of Shellcode Running Utilities☆111Updated 5 years ago
- External C2 Using IE COM Objects☆99Updated 6 years ago
- ☆17Updated 4 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 4 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- Initial Commit of Coresploit☆56Updated 3 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- few months old but better than nothing☆57Updated 3 years ago