0x1uke / lurker
Lurker is a cross-platform, companion implant to Cobalt Strike built with Go
☆18Updated this week
Related projects: ⓘ
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- ☆35Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated 8 months ago
- ☆47Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 2 months ago
- Lockless BOF☆62Updated 7 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆15Updated 6 months ago
- Click Once + App Domain☆61Updated 9 months ago
- Bunch of BOF files☆21Updated 7 months ago
- ☆57Updated 9 months ago
- A care package of useful bofs for red team engagments☆47Updated last year
- Unchain AMSI by patching the provider’s unmonitored memory space☆87Updated last year
- Reasonably undetected shellcode stager and executer.☆34Updated last week
- Rewrite to fit my needs☆25Updated 2 months ago
- ☆27Updated 3 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆74Updated 10 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆19Updated 3 months ago
- maldev obviously☆23Updated 2 months ago
- Threadless Injection Payload Toolkit☆11Updated 11 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆18Updated 9 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 10 months ago
- Enumerate the Domain for Readable and Writable Shares☆15Updated 3 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆60Updated last year
- Utilities for obfuscating shellcode☆38Updated 2 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆17Updated last year
- ☆25Updated last month
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆37Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆29Updated 10 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆32Updated 8 months ago