☆20Mar 21, 2024Updated last year
Alternatives and similar repositories for IPv4Fuscation-Encrypted
Users that are interested in IPv4Fuscation-Encrypted are comparing it to the libraries listed below
Sorting:
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 2 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 2 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆26Jul 15, 2024Updated last year
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆50Dec 15, 2025Updated 2 months ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆86Apr 15, 2025Updated 10 months ago
- Red Team Coin for crypto-mining operations.☆23Updated this week
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 10 months ago
- ☆37Feb 11, 2023Updated 3 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year