Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them ...
Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
翻译 - 规避技术以挫败和转移安全产品的检测和预防 (AV/EDR/XDR)
a tool to help operate in EDRs' blind spots
A tool that shows detailed information about named pipes in Windows
Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search for open ports.
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
翻译 - 基于 C# 的工具,可自动发现和利用目标二进制文件中的 DLL 劫持过程。发现的被劫持路径稍后可以在红队行动期间武器化以逃避 EDR。
UAC Bypass By Abusing Kerberos Tickets
FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highlighting those that contain matches.
Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the Python Flask...
翻译 - Vajra 是一个基于 UI 的工具,具有多种技术,用于在目标的 Azure 环境中进行攻击和枚举。它具有使用 Python Flask 模块构建的基于 Web 的直观用户界面,可提供更好的用户体验。该工具的主要重点是通过 Web UI 界面在一个地方拥有不同的攻击技术。
RPC Monitor tool based on Event Tracing for Windows
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory
LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.
A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.
翻译 - 用 C# 编写的后开发工具使用 CIM 或 WMI 来查询远程系统。
C# POC to extract NetNTLMv1/v2 hashes from ETW provider