Lists (6)
Sort Name ascending (A-Z)
Stars
- All languages
- ASP
- Assembly
- AutoIt
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Clojure
- DIGITAL Command Language
- Dockerfile
- F#
- FreeMarker
- Go
- HCL
- HTML
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- LLVM
- Logos
- Makefile
- Nim
- PHP
- Pascal
- PowerShell
- Python
- R
- Ruby
- Rust
- SCSS
- Shell
- Svelte
- Tcl
- TeX
- TypeScript
- VBA
- VBScript
- Verilog
- Visual Basic
- Vue
- XSLT
- YARA
Ladon大型内网渗透扫描器,PowerShell、Cobalt Strike插件、内存加载、无文件扫描。含端口扫描、服务识别、网络资产探测、密码审计、高危漏洞检测、漏洞利用、密码读取以及一键GetShell,支持批量A段/B段/C段以及跨网段扫描,支持URL、主机、域名列表扫描等。网络资产探测32种协议(ICMP\NBT\DNS\MAC\SMB\WMI\SSH\HTTP\HTTPS\Exc…
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
Open-Source Remote Administration Tool For Windows C# (RAT)
SharpSploit is a .NET post-exploitation library written in C#
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
Writing custom backdoor payloads with C# - Defcon 27 Workshop
Also known by Microsoft as Knifecoat 🌶️
Multi channel notification service for collaboration tools, e-commerce, news service and more.
PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments
OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.
这是一个一键辅助抓取360安全浏览器密码的CobaltStrike脚本以及解密小工具,用于节省红队工作量,通过下载浏览器数据库、记录密钥来离线解密浏览器密码。
Detect and respond to Cobalt Strike beacons using ETW.
This repository contains full code examples from the book Gray Hat C#
Materials for the workshop "Red Team Ops: Havoc 101"
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Test Blue Team detections without running any attack.
Changing values to bypass windows defender C#
C# port of WMImplant which uses either CIM or WMI to query remote systems
AmsiScanBufferBypass using D/Invoke