Templates for developing your own listeners and agents for AdaptixC2.
☆48Feb 28, 2026Updated 3 weeks ago
Alternatives and similar repositories for templates-extender
Users that are interested in templates-extender are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆172Mar 16, 2026Updated last week
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 3 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆200Dec 30, 2025Updated 2 months ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆81Nov 6, 2025Updated 4 months ago
- ☆16Nov 26, 2024Updated last year
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated last month
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated last month
- ☆33Mar 19, 2025Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 11 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 3 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- The code I write in my blog☆85Feb 21, 2026Updated last month
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆92Oct 10, 2022Updated 3 years ago
- A collection of position independent coding resources☆109Nov 15, 2025Updated 4 months ago
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- A hoontr must hoont☆106Nov 27, 2025Updated 3 months ago
- A repo of scripts I find helpful for daily tasks.☆30Dec 8, 2025Updated 3 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆129Nov 17, 2025Updated 4 months ago
- Injecting DLL into LSASS at boot☆156Apr 29, 2025Updated 10 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆145Feb 1, 2026Updated last month
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- Slides and resources from MCTTP 2025 Talk☆68Oct 26, 2025Updated 4 months ago
- Stealthily inject shellcode into an executable☆453Oct 19, 2025Updated 5 months ago
- ☆17Feb 14, 2025Updated last year
- early cascade injection PoC based on Outflanks blog post☆239Nov 7, 2024Updated last year
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆164Mar 15, 2026Updated last week
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆112Jan 26, 2026Updated last month
- ☆15Jan 26, 2023Updated 3 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆309Mar 31, 2025Updated 11 months ago
- A PoC for Early Cascade process injection technique.☆214Jan 30, 2025Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago