Templates for developing your own listeners and agents for AdaptixC2.
☆45Feb 28, 2026Updated this week
Alternatives and similar repositories for templates-extender
Users that are interested in templates-extender are comparing it to the libraries listed below
Sorting:
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆75Nov 6, 2025Updated 3 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Feb 3, 2026Updated last month
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 7 months ago
- NSecSoftBYOVD POC☆57Feb 12, 2026Updated 2 weeks ago
- ☆33Mar 19, 2025Updated 11 months ago
- ☆16Nov 26, 2024Updated last year
- ☆15Jan 26, 2023Updated 3 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- A repo of scripts I find helpful for daily tasks.☆30Dec 8, 2025Updated 2 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- ☆13Nov 24, 2019Updated 6 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆159Feb 19, 2026Updated last week
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated last month
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- A set of tools and resources for analysis of Havoc C2☆26Feb 27, 2024Updated 2 years ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆199Dec 30, 2025Updated 2 months ago
- 7z exploit POC versions prior to 25.01☆33Aug 11, 2025Updated 6 months ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- AppLocker-Based EDR Neutralization☆321Dec 19, 2025Updated 2 months ago
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated 2 months ago
- ☆20Nov 5, 2025Updated 3 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆102Jul 9, 2025Updated 7 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆89Jan 2, 2026Updated 2 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 11 months ago
- ☆88Jul 28, 2022Updated 3 years ago
- Stealthily inject shellcode into an executable☆452Oct 19, 2025Updated 4 months ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆64Jan 21, 2025Updated last year
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆167Sep 22, 2025Updated 5 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year