warpedatom / OffsetInspectLinks
PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.
☆31Updated last month
Alternatives and similar repositories for OffsetInspect
Users that are interested in OffsetInspect are comparing it to the libraries listed below
Sorting:
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Updated 3 weeks ago
- ☆36Updated 7 months ago
- A python script that automates a C2 Profile build☆48Updated last month
- This C# tool sprays for admin access over the entire domain☆87Updated 2 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- Just another EDR killer☆88Updated 2 weeks ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Updated 7 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆153Updated 6 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆140Updated 2 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆180Updated 3 weeks ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 6 months ago
- A small How-To on creating your own weaponized WSL file☆119Updated 6 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆163Updated 3 months ago
- Windows Thread Pool Injection Havoc Implementation☆32Updated last year
- A portable C# utility for enumerating local and remote windows sessions☆55Updated last month
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Updated 2 months ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆205Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆162Updated 3 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Updated 2 months ago
- Shellcode injection using the Windows Debugging API☆164Updated last month
- Utilizng an MCP Server to communicate with your C2☆86Updated 8 months ago
- ☆55Updated 8 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Updated 3 weeks ago
- A tool to play with scheduled tasks on Windows, in Rust☆121Updated 3 months ago
- Proof of concept for Kerberos Armoring abuse.☆77Updated last month
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆135Updated 7 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆80Updated last week
- .NET tool used to enrich RPC telemetry☆101Updated 2 weeks ago
- Convert your shellcode into an ASCII string☆125Updated 7 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆113Updated last month