0x09AL / Browser-C2
Post Exploitation agent which uses a browser to do C2 operations.
☆99Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Browser-C2
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago
- Liniaal - A communication extension to Ruler☆96Updated 6 years ago
- Cobalt Strike SCT payload obfuscator☆142Updated 7 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆108Updated 6 years ago
- a simple portforwarder in ps1 with embeded c# code☆89Updated 6 years ago
- ☆58Updated 7 years ago
- POC for Cobalt Strike external C2☆121Updated 3 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆50Updated 6 years ago
- Malleable C2 profiles for Cobalt Strike☆68Updated 2 years ago
- Generates anti-sandbox analysis HTA files without payloads☆118Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 5 years ago
- Automates credential skimming from service accounts in Windows Registry☆73Updated 4 years ago
- Splunk Dashboard for CobaltStrike logs☆85Updated 3 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆117Updated 5 years ago
- ☆44Updated 4 years ago
- ☆84Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago
- initial commit☆42Updated this week
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆111Updated 7 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆144Updated 6 years ago
- Use powershell to test Office-based persistence methods☆76Updated 3 years ago
- Empire HTTP(S) C2 redirector setup script☆46Updated 6 years ago