v4resk / red-bookLinks
The Red-book: The Art of Offensive CyberSecurity
☆93Updated this week
Alternatives and similar repositories for red-book
Users that are interested in red-book are comparing it to the libraries listed below
Sorting:
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- Evasive Golang Loader☆138Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆138Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆111Updated last month
- ☆99Updated 9 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆181Updated 2 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- ☆87Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- random code snippets, useful for getting started☆121Updated last year
- Different methods to get current username without using whoami☆182Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 4 years ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆137Updated 8 months ago
- 「💀」Proof of concept on BYOVD attack☆165Updated 11 months ago
- ☆163Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆105Updated 3 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆143Updated 2 years ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆119Updated 5 months ago
- ☆138Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Updated last year
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆152Updated 3 months ago
- An interactive shell to spoof some LOLBins command line☆187Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆179Updated 6 months ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆161Updated last year
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 5 months ago