v4resk / red-bookLinks
The Red-book: The Art of Offensive CyberSecurity
☆95Updated this week
Alternatives and similar repositories for red-book
Users that are interested in red-book are comparing it to the libraries listed below
Sorting:
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆138Updated 2 years ago
- ☆87Updated last year
- ☆137Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 7 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆138Updated 8 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆113Updated 2 months ago
- Command and Control (C2) framework☆132Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆120Updated 6 months ago
- ☆102Updated 10 months ago
- Different methods to get current username without using whoami☆183Updated last year
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- Evasive Golang Loader☆138Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 4 years ago
- PowerShell Obfuscator☆223Updated 3 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆143Updated 2 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated 11 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆173Updated 6 months ago
- List of some AD tools I frequently use☆53Updated last month
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆190Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆105Updated 3 years ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 5 months ago
- ☆163Updated 2 years ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- random code snippets, useful for getting started☆123Updated 2 weeks ago