redr0nin / SerenityView external linksLinks
C# DInvoke Shellcode Runner
☆31Feb 10, 2025Updated last year
Alternatives and similar repositories for Serenity
Users that are interested in Serenity are comparing it to the libraries listed below
Sorting:
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- XOR-based shellcode encoder☆30Apr 20, 2023Updated 2 years ago
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- ☆21Jan 8, 2026Updated last month
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last week
- ☆59Nov 13, 2024Updated last year
- ☆27Feb 3, 2026Updated last week
- ☆26Mar 11, 2025Updated 11 months ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 6 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Mar 10, 2025Updated 11 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆261Apr 14, 2025Updated 10 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆77Feb 8, 2023Updated 3 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- UUID based Shellcode loader for your favorite C2☆86Dec 8, 2021Updated 4 years ago
- ☆53Sep 23, 2025Updated 4 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Dec 7, 2024Updated last year
- ☆109Feb 17, 2025Updated 11 months ago
- ☆38Feb 26, 2025Updated 11 months ago
- Test AMSI Provider implementation in C#☆42Dec 18, 2024Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- ☆33Apr 7, 2020Updated 5 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Dec 6, 2024Updated last year
- Select any exported function in a dll as the new dll's entry point.☆82Oct 25, 2024Updated last year
- Command Augmentation support for BOFs and .NET assemblies across agents☆38Jan 12, 2026Updated last month
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Simple BOF to read the protection level of a process☆118May 10, 2023Updated 2 years ago
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆408Aug 22, 2023Updated 2 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆94May 9, 2023Updated 2 years ago
- A .NET malware loader, using API-Hashing to evade static analysis☆210May 30, 2023Updated 2 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆259Jun 29, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆31Jan 27, 2025Updated last year
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 7 months ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago