spellshift / realmLinks
Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
☆584Updated this week
Alternatives and similar repositories for realm
Users that are interested in realm are comparing it to the libraries listed below
Sorting:
- An offensive data enrichment pipeline☆895Updated this week
- a tool to help operate in EDRs' blind spots☆769Updated last year
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,125Updated last year
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆402Updated 2 months ago
- ☆299Updated 2 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆599Updated last month
- Simulate the behavior of AV/EDR for malware development training.☆562Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆722Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,008Updated last month
- Because AV evasion should be easy.☆854Updated last year
- A light-weight first-stage C2 implant written in Nim (and Rust).☆932Updated 10 months ago
- A command and control framework written in rust.☆385Updated 5 months ago
- An ADCS honeypot to catch attackers in your internal network.☆324Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,296Updated 2 months ago
- A collection of offensive Go packages inspired by different Go repositories.☆254Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆851Updated 2 years ago
- AV/EDR Lab environment setup references to help in Malware development☆423Updated 11 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆352Updated 2 years ago
- Tuoni☆217Updated 3 weeks ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆744Updated 8 months ago
- A tool to transform Chromium browsers into a C2 Implant☆542Updated last month
- Tool to remotely dump secrets from the Windows registry☆521Updated 2 months ago
- Analyse your malware to surgically obfuscate it☆517Updated last month
- Materials for the workshop "Red Team Ops: Havoc 101"☆396Updated last year
- Useful C2 techniques and cheat sheets learned from engagements☆576Updated 4 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆439Updated 4 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆766Updated last week
- EDR Lab for Experimentation Purposes☆1,409Updated 2 weeks ago
- Sandman is a NTP based backdoor for hardened networks.☆816Updated last year
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆841Updated 11 months ago