trickster0 / OffensiveRust
Rust Weaponization for Red Team Engagements.
☆2,720Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for OffensiveRust
- 🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,262Updated this week
- The Havoc Framework☆6,860Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,356Updated 2 years ago
- A fast, simple, recursive content discovery tool written in Rust.☆5,965Updated 2 months ago
- This repository contains my complete resources and coding practices for malware development using Rust 🦀.☆1,454Updated this week
- Notion as a platform for offensive operations☆1,126Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,740Updated last year
- A workshop about Malware Development☆1,585Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,850Updated last year
- Adversary Emulation Framework☆8,553Updated last week
- Automation for internal Windows Penetrationtest / AD-Security☆3,337Updated 9 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,337Updated 11 months ago
- Collection of various malicious functionality to aid in malware development☆1,498Updated 8 months ago
- A collaborative, multi-platform, red teaming framework☆3,264Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,877Updated last week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,739Updated 5 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,044Updated 3 years ago
- Red Teaming Tactics and Techniques☆4,065Updated 2 months ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆2,843Updated 6 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,802Updated last month
- The Network Execution Tool☆3,274Updated this week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆2,820Updated 2 weeks ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,301Updated last week
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,430Updated 5 months ago
- game of active directory☆5,429Updated this week
- Gather and update all available and newest CVEs with their PoC.☆6,587Updated this week
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,404Updated last year
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆1,979Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,044Updated 3 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,261Updated last week