APT64 / EternalHushFrameworkLinks
EternalHush - java-based open-source c2 framework that targets Microsoft Windows
β18Updated this week
Alternatives and similar repositories for EternalHushFramework
Users that are interested in EternalHushFramework are comparing it to the libraries listed below
Sorting:
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β159Updated 2 years ago
- β168Updated 2 years ago
- Documents Exfiltration project for fun and educational purposesβ145Updated 2 years ago
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated 2 years ago
- VMware Aria Operations for Logs CVE-2023-34051β61Updated 2 years ago
- Dump Windows SAM hashesβ42Updated 2 years ago
- β222Updated last year
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.β281Updated 11 months ago
- β89Updated 2 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teamsβ132Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replicationβ115Updated 2 years ago
- A shellcode injection tool showcasing various process injection techniquesβ136Updated 2 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.β89Updated 2 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profilesβ202Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.β165Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIsβ¦β163Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)β83Updated 2 years ago
- Automated .NET AppDomain hijack payload generationβ129Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ54Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerabilityβ41Updated 3 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β155Updated last year
- β163Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipeβ172Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromisβ¦β126Updated last year
- β85Updated last year
- Abuse leaked token handles.β134Updated 2 years ago
- ACL abuse swiss-knifeβ127Updated 3 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructureβ145Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact versionβ188Updated 3 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β112Updated 2 years ago