Monarch - The Adversary Emulation Toolkit
☆64Jan 7, 2025Updated last year
Alternatives and similar repositories for monarch
Users that are interested in monarch are comparing it to the libraries listed below
Sorting:
- ☆35Dec 21, 2023Updated 2 years ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- ☆62Dec 13, 2025Updated 3 months ago
- Linux Sleep Obfuscation☆112Jan 7, 2024Updated 2 years ago
- Command and Control (C2) framework☆132May 16, 2025Updated 10 months ago
- ☆101Oct 7, 2023Updated 2 years ago
- A stager and implant that executes remote Web Assembly☆37Feb 4, 2026Updated last month
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆41Dec 17, 2025Updated 3 months ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Reflective PE loader written in Rust. Loads and executes native and .NET PE files directly from memory.☆44Mar 2, 2026Updated 2 weeks ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- Nameless C2 - A C2 with all its components written in Rust☆284Sep 26, 2024Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆92Oct 10, 2022Updated 3 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Windows C++ Implant for Exploration C2☆45Jan 26, 2026Updated last month
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- ☆60Dec 15, 2023Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆60Dec 15, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆359Mar 2, 2024Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated last year
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Generate Shellcode Loaders & Injects☆159May 15, 2023Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆190Mar 4, 2024Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago