0xEr3bus / ShadowForgeC2Links
ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.
☆47Updated last year
Alternatives and similar repositories for ShadowForgeC2
Users that are interested in ShadowForgeC2 are comparing it to the libraries listed below
Sorting:
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- ☆55Updated 7 months ago
- ☆34Updated 2 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ☆27Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- ☆48Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 2 months ago
- in-process powershell runner for BRC4☆45Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated last year
- PowerShell script to generate ShellCode in various formats☆42Updated 8 months ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated last month
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆38Updated 5 months ago
- ☆59Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- A pure C version of SymProcAddress☆27Updated last year
- Windows Administrator level Implant.☆49Updated 8 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 9 months ago
- ☆57Updated 7 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 8 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- ☆36Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago