v4resk / red-bookLinks
The Red-book: The Art of Offensive CyberSecurity
☆108Updated 3 weeks ago
Alternatives and similar repositories for red-book
Users that are interested in red-book are comparing it to the libraries listed below
Sorting:
- ☆106Updated 11 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 7 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆140Updated 2 years ago
- ☆95Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 4 years ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- Evasive Golang Loader☆137Updated last year
- My Favorite Offensive Security Scripts☆82Updated 9 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆139Updated 10 months ago
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆109Updated 4 years ago
- ☆137Updated 2 years ago
- ☆75Updated 10 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- Awesome Privilege Escalation☆142Updated 3 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year
- ☆47Updated 3 months ago
- Basic reverse shell in C using socket() with complete explanation☆68Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆102Updated last month
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆46Updated 6 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆175Updated 8 months ago
- Documents Exfiltration project for fun and educational purposes☆145Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- ☆63Updated 2 years ago
- The different ways to dump lsass☆206Updated 5 months ago
- Inject RDPThief into memory with PowerShell.☆65Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- AV Evasion Techniques☆83Updated 3 years ago