spellshift / realmLinks
Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
☆514Updated last month
Alternatives and similar repositories for realm
Users that are interested in realm are comparing it to the libraries listed below
Sorting:
- An offensive data enrichment pipeline☆775Updated last week
- a tool to help operate in EDRs' blind spots☆746Updated 7 months ago
- A command and control framework written in rust.☆357Updated 5 months ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,040Updated 9 months ago
- ☆296Updated last year
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆385Updated 2 months ago
- Simulate the behavior of AV/EDR for malware development training.☆530Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆392Updated 5 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆522Updated 2 months ago
- A collection of offensive Go packages inspired by different Go repositories.☆245Updated 8 months ago
- Because AV evasion should be easy.☆767Updated 7 months ago
- Apply a divide and conquer approach to bypass EDRs☆280Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆719Updated last year
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆674Updated 4 months ago
- Tool to remotely dump secrets from the Windows registry☆471Updated last month
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆298Updated 11 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆767Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆920Updated 3 weeks ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆676Updated last month
- Materials for the workshop "Red Team Ops: Havoc 101"☆381Updated 9 months ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆800Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆988Updated last month
- EDR Lab for Experimentation Purposes☆1,291Updated this week
- An ADCS honeypot to catch attackers in your internal network.☆299Updated last year
- Analyse your malware to surgically obfuscate it☆483Updated last month
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆188Updated 10 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆606Updated last year
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆291Updated 3 weeks ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆329Updated 2 years ago
- A light-weight first-stage C2 implant written in Nim (and Rust).☆898Updated 3 months ago