Templates for developing your own listeners and agents for AdaptixC2.
☆49Feb 28, 2026Updated last month
Alternatives and similar repositories for templates-extender
Users that are interested in templates-extender are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆187Updated this week
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 4 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆202Dec 30, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 9 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆81Nov 6, 2025Updated 5 months ago
- ☆16Nov 26, 2024Updated last year
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated 2 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated 2 months ago
- ☆34Mar 19, 2025Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 4 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The code I write in my blog☆93Feb 21, 2026Updated last month
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆92Oct 10, 2022Updated 3 years ago
- A collection of position independent coding resources☆111Nov 15, 2025Updated 4 months ago
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- A repo of scripts I find helpful for daily tasks.☆30Dec 8, 2025Updated 4 months ago
- A hoontr must hoont☆107Nov 27, 2025Updated 4 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆130Nov 17, 2025Updated 4 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Injecting DLL into LSASS at boot☆156Apr 29, 2025Updated 11 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆146Feb 1, 2026Updated 2 months ago
- Deploy a phishing infrastructure on the fly.☆78Dec 21, 2024Updated last year
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28Feb 18, 2026Updated last month
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 5 months ago
- ☆17Feb 14, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- Stealthily inject shellcode into an executable☆459Oct 19, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 2 months ago
- ☆15Jan 26, 2023Updated 3 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 4 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆312Mar 31, 2025Updated last year
- A PoC for Early Cascade process injection technique.☆215Jan 30, 2025Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago