zeroSteiner / crimson-forgeLinks
Sustainable shellcode evasion
☆112Updated last year
Alternatives and similar repositories for crimson-forge
Users that are interested in crimson-forge are comparing it to the libraries listed below
Sorting:
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 6 years ago
- Proper Payload Protection Prevents Poor Performance☆76Updated 3 years ago
- Code Exec via Excel☆89Updated 8 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆68Updated 5 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 5 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- ☆46Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- ☆127Updated 5 years ago
- Suite of Shellcode Running Utilities☆114Updated 6 years ago
- ☆110Updated 7 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Updated 7 years ago
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91Updated 3 years ago
- D/Invoke port of UrbanBishop☆108Updated 5 years ago
- Managed code hooking template.☆108Updated 4 years ago
- ☆45Updated 7 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆141Updated 4 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 6 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- Port of Invoke-Excel4DCOM☆104Updated 6 years ago
- F# Implementation to spawn shellcode☆47Updated 7 years ago
- Targeted Payload Execution☆100Updated 5 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Updated 5 years ago
- Outlook persistence using VSTO add-ins☆87Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- A more obfuscated CactusTorch targeted towards office☆31Updated 5 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆130Updated 4 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Updated 6 years ago
- named pipe server with impersonation☆60Updated 6 years ago
- Iterative AD discovery toolkit for offensive operations☆85Updated 5 years ago