APT64 / EternalHushFrameworkLinks
EternalHush - java-based open-source c2 framework that targets Microsoft Windows
β18Updated this week
Alternatives and similar repositories for EternalHushFramework
Users that are interested in EternalHushFramework are comparing it to the libraries listed below
Sorting:
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β159Updated 2 years ago
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated 2 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromisβ¦β126Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIsβ¦β163Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ136Updated 2 years ago
- Documents Exfiltration project for fun and educational purposesβ145Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ54Updated 2 years ago
- β222Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β155Updated last year
- β168Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerabilityβ41Updated 3 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profilesβ202Updated last year
- yet another AV killer tool using BYOVDβ300Updated 2 years ago
- β89Updated 2 years ago
- Automated .NET AppDomain hijack payload generationβ129Updated last year
- Dump Windows SAM hashesβ42Updated 2 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructureβ145Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replicationβ115Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ70Updated 2 years ago
- β163Updated 2 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll fileβ36Updated 2 years ago
- Winsocket for Cobalt Strike.β102Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)β83Updated 2 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.β89Updated 2 years ago
- Set of python scripts which perform different ways of command execution via WMI protocol.β165Updated 2 years ago
- VMware Aria Operations for Logs CVE-2023-34051β61Updated 2 years ago
- β114Updated 2 years ago
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL serversβ53Updated last year
- β85Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β112Updated 2 years ago