Monarch - The Adversary Emulation Toolkit
☆64Jan 7, 2025Updated last year
Alternatives and similar repositories for monarch
Users that are interested in monarch are comparing it to the libraries listed below
Sorting:
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Command and Control (C2) framework☆132May 16, 2025Updated 9 months ago
- ☆35Dec 21, 2023Updated 2 years ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- ☆101Oct 7, 2023Updated 2 years ago
- Linux Sleep Obfuscation☆112Jan 7, 2024Updated 2 years ago
- ☆62Dec 13, 2025Updated 2 months ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- Nameless C2 - A C2 with all its components written in Rust☆283Sep 26, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆41Dec 17, 2025Updated 2 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Updated this week
- Generate Shellcode Loaders & Injects☆159May 15, 2023Updated 2 years ago
- Lockless BOF☆79May 2, 2025Updated 9 months ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- ☆29May 10, 2024Updated last year
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆360Mar 2, 2024Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆190Mar 4, 2024Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆59Dec 15, 2023Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Jul 23, 2023Updated 2 years ago
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- Simple Native Rust Reflective PE loader library☆43Apr 18, 2023Updated 2 years ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Lightweight C# windows agent for Apfell☆17Mar 16, 2020Updated 5 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 11 months ago