zeroSteiner / crimson-forgeLinks
Sustainable shellcode evasion
☆112Updated last year
Alternatives and similar repositories for crimson-forge
Users that are interested in crimson-forge are comparing it to the libraries listed below
Sorting:
- Proper Payload Protection Prevents Poor Performance☆75Updated 3 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 6 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 5 years ago
- Code Exec via Excel☆88Updated 8 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆67Updated 5 years ago
- ☆46Updated 4 years ago
- Targeted Payload Execution☆100Updated 5 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Suite of Shellcode Running Utilities☆114Updated 5 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆129Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- D/Invoke port of UrbanBishop☆108Updated 5 years ago
- Managed code hooking template.☆108Updated 4 years ago
- ☆110Updated 7 years ago
- Port of Invoke-Excel4DCOM☆104Updated 6 years ago
- AMSI Bypass Via the Heap☆107Updated 5 years ago
- F# Implementation to spawn shellcode☆47Updated 7 years ago
- Outlook persistence using VSTO add-ins☆87Updated 4 years ago
- named pipe server with impersonation☆60Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 6 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆142Updated 4 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- ☆127Updated 5 years ago
- POC for NetworkService PrivEsc☆126Updated 5 years ago
- Simple .NET assembly to interact with services.☆43Updated 6 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- Initial Commit of Coresploit☆57Updated 4 years ago
- ☆73Updated 4 years ago
- An Insider Threat Toolkit☆155Updated 6 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 4 years ago