SaaSHub helps you find the best software and product alternatives Learn more →
Top 10 C# redteam-tool Projects
-
ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
frostbyte
FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
-
SharpGmailC2
Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Project mention: KRBUACBypass: UAC Bypass By Abusing Kerberos Tickets | /r/purpleteamsec | 2023-07-30
C# redteam-tools related posts
- frostbyte: FrostByte is a PoC project that combines different defense evasion techniques to build better redteam payloads - embed an encrypted shellcode stub into a known signed executable and still manage to keep it signed like how the Zloader malware did.
- Encrypt / Decrypt files / folders to simulate ransomware
- GitHub - iomoath/SharpStrike: A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.
- SharpStrike: A Post exploitation tool written in C# uses either CIM or WMI to query remote systems
- GitHub - knight0x07/ImpulsiveDLLHijack: C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
- AggressiveProxy - Project to enumerate proxy configurations and generate shellcode from CobaltStrike
-
A note from our sponsor - SaaSHub
www.saashub.com | 19 Apr 2024
Index
What are some of the best open-source redteam-tool projects in C#? This list will help you:
Project | Stars | |
---|---|---|
1 | PipeViewer | 527 |
2 | ImpulsiveDLLHijack | 467 |
3 | KRBUACBypass | 441 |
4 | frostbyte | 365 |
5 | RPCMon | 302 |
6 | SharpGmailC2 | 252 |
7 | SharpStrike | 199 |
8 | Jasmin-Ransomware | 149 |
9 | AggressiveProxy | 140 |
10 | DPAPISnoop | 127 |