Adaptix-Framework / AdaptixC2
☆250Updated this week
Alternatives and similar repositories for AdaptixC2:
Users that are interested in AdaptixC2 are comparing it to the libraries listed below
- Evasive shellcode loader☆343Updated 4 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆249Updated 6 months ago
- ☆162Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆357Updated 4 months ago
- AV bypass while you sip your Chai!☆218Updated 9 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆434Updated 3 weeks ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 9 months ago
- ☆344Updated 2 months ago
- ☆219Updated last month
- An aggressor script that can help automate payload building in Cobalt Strike☆114Updated last year
- ☆138Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated last month
- yet another AV killer tool using BYOVD☆264Updated last year
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆298Updated 9 months ago
- Nameless C2 - A C2 with all its components written in Rust☆261Updated 5 months ago
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆177Updated 7 months ago
- ☆297Updated 3 months ago
- TeamServer and Client of Exploration Command and Control Framework☆105Updated last week
- POC exploit for CVE-2024-49138☆240Updated 2 weeks ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆276Updated 9 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆385Updated 7 months ago
- 「💀」Proof of concept on BYOVD attack☆154Updated 2 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆370Updated 6 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆259Updated 3 weeks ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆393Updated 8 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆296Updated 10 months ago
- ☆271Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆559Updated 8 months ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆224Updated last month