v4resk / red-bookLinks
The Red-book: The Art of Offensive CyberSecurity
☆101Updated last week
Alternatives and similar repositories for red-book
Users that are interested in red-book are comparing it to the libraries listed below
Sorting:
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- ☆136Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)☆183Updated 2 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated 11 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆175Updated 7 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆139Updated 9 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 4 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆138Updated 2 years ago
- Evasive Golang Loader☆137Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- Command and Control (C2) framework☆132Updated 7 months ago
- ☆75Updated 9 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆122Updated 6 months ago
- ☆94Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 7 months ago
- The different ways to dump lsass☆203Updated 4 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆153Updated 5 months ago
- ☆103Updated 10 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆145Updated 2 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆231Updated 10 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆257Updated last year
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 6 months ago
- ☆163Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆106Updated 4 years ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Updated last year
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- Different methods to get current username without using whoami☆182Updated last year