Skip to content
View D3Ext's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report D3Ext

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

Red Teaming

Tools, examples and more about Red Team operations (e.g. shellcode injection, persistence, bypassing...)
93 repositories

A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)

C++ 552 72 Updated Apr 8, 2025

A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.

Python 536 76 Updated Aug 1, 2022

Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…

PowerShell 2,053 214 Updated Dec 11, 2024

Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps C…

Python 627 108 Updated May 28, 2025

A set of scripts that demonstrate how to perform memory injection in C#

C# 321 80 Updated Nov 5, 2017

Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by bruteforcing the decryption key, and then executing the decrypted ev…

Python 353 70 Updated Apr 20, 2022

Nishang - Offensive PowerShell for red team, penetration testing and offensive security.

PowerShell 9,755 2,548 Updated Apr 25, 2024

Open source C2 server created for stealth red team operations

PowerShell 835 172 Updated Sep 26, 2022

Red Team Cheatsheet in constant expansion.

1,257 166 Updated Dec 28, 2023

Dumping LAPS from Python

Python 282 39 Updated Dec 7, 2022

Various PowerShell scripts that may be useful during red team exercise

PowerShell 959 252 Updated Apr 28, 2022

Various PowerShell functions and scripts

PowerShell 974 261 Updated Jun 5, 2020

A tool to elevate privilege with Windows Tokens

C# 1,053 204 Updated Oct 6, 2023

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

XSLT 8,325 1,115 Updated Dec 6, 2025

PoC dlls for Task Scheduler COM Hijacking

C++ 94 34 Updated Jul 20, 2016

Nidhogg is an all-in-one simple to use windows kernel rootkit.

C++ 2,259 319 Updated Feb 15, 2026

SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader

C# 1,307 244 Updated Oct 1, 2019

An open-source, free protector for .NET applications

C# 2,794 419 Updated Jun 7, 2024

Fileless lateral movement tool that relies on ChangeServiceConfigA to run command

C 1,600 256 Updated Jul 10, 2023

A collaborative, multi-platform, red teaming framework

JavaScript 4,308 557 Updated Feb 19, 2026

RunasCs - Csharp and open version of windows builtin runas.exe

C# 1,339 158 Updated Jul 12, 2024

A new AMSI Bypass technique using .NET ALI Call Hooking.

PowerShell 192 39 Updated Nov 15, 2022

A simple shell code encryptor/decryptor/executor to bypass anti virus.

C# 471 85 Updated Dec 13, 2021

A modular C2 framework

JavaScript 507 88 Updated Feb 20, 2026

SharpGen is a .NET Core console application that utilizes the Rosyln C# compiler to quickly cross-compile .NET Framework console applications or libraries.

C# 301 55 Updated Apr 23, 2021

Scan installed EDRs and AVs on Windows

Go 605 82 Updated Dec 10, 2025

Hiding GoPhish from the boys in blue

Go 202 61 Updated Dec 6, 2022

Open-Source Phishing Toolkit

Go 13,582 2,838 Updated Sep 23, 2024

Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions

Go 494 72 Updated Apr 1, 2021

A post exploitation framework designed to operate covertly on heavily monitored environments

C 2,167 335 Updated Sep 29, 2021