roadwy / RIP
☆1,464Updated last year
Alternatives and similar repositories for RIP:
Users that are interested in RIP are comparing it to the libraries listed below
- CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit☆805Updated last year
- A tool for generating fake code signing certificates or signing real ones☆904Updated last year
- CVE-2021-40444 PoC☆1,617Updated 3 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆838Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,188Updated last year
- c++ fully undetected shellcode launcher ;)☆976Updated 3 years ago
- Open-Source Shellcode & PE Packer☆1,925Updated last year
- Shellcode injection technique. Given as C++ header, standalone Rust program or library.☆695Updated last year
- some gadgets about windows process and ready to use :)☆584Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,795Updated last year
- Microsoft » Windows 10 : Security Vulnerabilities☆906Updated last year
- Template-Driven AV/EDR Evasion Framework☆1,651Updated last year
- A simple python packer to easily bypass Windows Defender☆633Updated 2 years ago
- Linux/Windows post-exploitation framework made by linux user☆1,517Updated 2 weeks ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆1,927Updated 7 months ago
- Create fake certs for binaries using windows binaries and the power of bat files☆558Updated last year
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,094Updated 3 years ago
- A protective and Low Level Shellcode Loader that defeats modern EDR systems.☆900Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,753Updated 2 years ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,083Updated 2 months ago
- Open source C2 server created for stealth red team operations☆803Updated 2 years ago
- A C2 post-exploitation framework☆472Updated last year
- Encrypted PE Loader Generator☆540Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,085Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,586Updated 2 years ago
- The swiss army knife of LSASS dumping☆1,893Updated 6 months ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,112Updated last year
- Golang malware development library☆950Updated 3 months ago
- C/C++ source obfuscator for antivirus bypass☆1,028Updated 3 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆382Updated 4 years ago