Stars
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.
Collection of Cyber Threat Intelligence sources from the deep and dark web
This map lists the essential techniques to bypass anti-virus and EDR
The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).
Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.
A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.
Nimbo-C2 is yet another (simple and lightweight) C2 framework
Cobalt Strike HTTPS beaconing over Microsoft Graph API
DeimosC2 is a Golang command and control framework for post-exploitation.
Awesome EDR Bypass Resources For Ethical Hacking
RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust 🦀
A collection of Offensive Go packages.
PoC Implementation of a fully dynamic call stack spoofer
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
Cast warptime on your C2! These playbooks automate the setup and teardown of C2 infrastructure for penetration test engagements.
Automated AWS serverless infrastructure for Red Team C2 redirectors
Harvis is designed to automate your C2 Infrastructure.
Wiki to collect Red Team infrastructure hardening resources
elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
Phanto is a utility that specializes in UAC bypass and privilege escalation, enabling it to bypass User Account Control on Windows 10 and 11 systems and attain Administrator privileges.
Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applications to elevate privileges.
Collection of Notes and CheatSheets used for Red teaming Certs
Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.