Single executable reverse SOCKS5 proxy written in Golang.
☆147Oct 27, 2025Updated 4 months ago
Alternatives and similar repositories for ReverseSocks5
Users that are interested in ReverseSocks5 are comparing it to the libraries listed below
Sorting:
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- Fileless Command Execution for Lateral Movement in Nim☆389Dec 12, 2023Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆675Aug 15, 2025Updated 6 months ago
- ☆129Dec 4, 2023Updated 2 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆546Nov 23, 2025Updated 3 months ago
- Go shellcode loader that combines multiple evasion techniques☆389Jun 21, 2023Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- A tiny Reverse Sock5 Proxy written in C :V☆315Nov 28, 2022Updated 3 years ago
- New generation of wmiexec.py☆1,254Jan 5, 2026Updated 2 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆322Sep 23, 2022Updated 3 years ago
- .net config loader☆348Nov 9, 2023Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆240Jun 22, 2023Updated 2 years ago
- Apply a divide and conquer approach to bypass EDRs☆286Oct 19, 2023Updated 2 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆326Jan 31, 2023Updated 3 years ago
- ☆153Jan 6, 2023Updated 3 years ago
- Your syscall factory☆126Jan 13, 2026Updated last month
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,053Jan 22, 2026Updated last month
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,006Jun 4, 2024Updated last year
- ☆129Jun 28, 2023Updated 2 years ago
- Threadless Process Injection using remote function hooking.☆810Sep 4, 2024Updated last year
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Execute unmanaged Windows executables in CobaltStrike Beacons☆714Mar 4, 2023Updated 3 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- ☆36May 27, 2024Updated last year
- A C2 post-exploitation framework☆484Jan 24, 2024Updated 2 years ago
- A C# Command & Control framework☆1,026Mar 28, 2024Updated last year
- ☆223Mar 10, 2024Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆586Mar 19, 2024Updated last year
- A rust library that allows you to host the CLR and execute dotnet binaries.☆236Mar 12, 2025Updated 11 months ago
- HVNC for Cobalt Strike☆1,301Dec 7, 2023Updated 2 years ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆225Nov 23, 2023Updated 2 years ago