zeroSteiner / crimson-forge
Sustainable shellcode evasion
☆106Updated last month
Alternatives and similar repositories for crimson-forge:
Users that are interested in crimson-forge are comparing it to the libraries listed below
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆69Updated 4 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆87Updated 5 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆63Updated 4 years ago
- Port of Invoke-Excel4DCOM☆102Updated 5 years ago
- AMSI Bypass Via the Heap☆105Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆121Updated 3 years ago
- Suite of Shellcode Running Utilities☆107Updated 4 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆83Updated 4 years ago
- MiniDumpWriteDump behavior modification hook☆49Updated 3 years ago
- ☆91Updated 3 years ago
- ☆45Updated 3 years ago
- This code was used for the blogpost on secjuice.☆41Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆92Updated 2 years ago
- D/Invoke port of UrbanBishop☆105Updated 4 years ago
- ☆123Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Load C# Code straight to memory☆53Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆108Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆84Updated 3 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆118Updated 3 years ago
- ☆8Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 4 years ago
- Targeted Payload Execution☆97Updated 4 years ago
- (kinda) Malicious Outlook Reader☆133Updated 3 years ago