90N45-d3v / BlueBunny
BLE based C2 for Hak5's Bash Bunny
☆15Updated last year
Alternatives and similar repositories for BlueBunny:
Users that are interested in BlueBunny are comparing it to the libraries listed below
- ☆21Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Beacon Object Files used for Cobalt Strike☆18Updated last year
- Python C2 with JScript Implant☆14Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆13Updated 3 months ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆21Updated 2 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated last month
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- ☆18Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- ☆18Updated 4 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A simple rpc2socks alternative in pure Go.☆28Updated 9 months ago
- ☆12Updated 2 years ago
- A little implant which SSH's back with a shell☆37Updated 3 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 11 months ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- Tools for Attacking Pleasant Password Server☆22Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆26Updated 2 weeks ago