Red Team Coin for crypto-mining operations.
☆23Mar 1, 2026Updated last month
Alternatives and similar repositories for RedTeamCoin
Users that are interested in RedTeamCoin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 9 months ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 2 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆32May 23, 2025Updated 10 months ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 10 months ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 6 months ago
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated 3 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Minimal ELF inspector written in C for quick binary layout inspection☆29Jan 9, 2026Updated 2 months ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 7 months ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆24Nov 9, 2022Updated 3 years ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆52Nov 2, 2025Updated 5 months ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated 2 months ago
- ☆53Oct 29, 2024Updated last year
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- General Content☆27Dec 23, 2025Updated 3 months ago
- 🐕 Linux security audit tool☆46Feb 7, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆16Jun 15, 2025Updated 9 months ago
- Jelly is a SSH social network☆130Apr 1, 2026Updated last week
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- PCB design for the initial prototype of OBC hardware, to interface with LaunchPad.☆10Sep 19, 2018Updated 7 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Sep 15, 2023Updated 2 years ago
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆55Dec 9, 2025Updated 4 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆134Dec 8, 2025Updated 4 months ago
- YesMan☆17Nov 8, 2023Updated 2 years ago
- a repository that contains the program.cs source file that has D/Invoke bare minimum implementation and AES encryption for shellcode exec…☆23Feb 25, 2023Updated 3 years ago
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆16Updated this week
- Living Off Security Tools☆60Nov 23, 2025Updated 4 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆78Nov 10, 2025Updated 4 months ago