Local privilege escalation via PetitPotam (Abusing impersonate privileges).
-
Updated
Mar 30, 2023 - C
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
市场上虽然存在大量的网络安全工具和软件,但它们大多针对某一特定领域或功能,缺乏一个统一的、集成的、易于使用的综合工具平台。这导致参赛者在CTF竞赛中需要频繁切换不同的工具,不仅降低了工作效率,还增加了操作失误的风险。由gitee转发 ↓
A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON
UUID based Shellcode loader for your favorite C2
Cross-platform RAT, written in C
Red Team Operation's Defense Evasion Technique.
An opensource Prank Startup Malware for windows developed using C Programming Language.
Colección de herramientas y scripts enfocados al Red-Team y CTFs
Takes host-file, username-file, password-file, and command-file. Brute forces SSH credentials and on success runs commands.
Add a description, image, and links to the redteam-tools topic page so that developers can more easily learn about it.
To associate your repository with the redteam-tools topic, visit your repo's landing page and select "manage topics."