Arr3stY0u / geacon_plusLinks
CobaltStrike beacon written in golang
☆27Updated 2 years ago
Alternatives and similar repositories for geacon_plus
Users that are interested in geacon_plus are comparing it to the libraries listed below
Sorting:
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- Beacon Object Files.☆37Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆83Updated 2 years ago
- ☆89Updated last year
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆55Updated last year
- ownCloud exploits for CVE-2023-49105☆36Updated last year
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆58Updated 2 years ago
- CVE-2024-40711-exp☆42Updated 10 months ago
- ☆16Updated 2 years ago
- The king of shell -Javaweb Memory Shell☆25Updated 2 years ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆47Updated last year
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Updated last year
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆54Updated last year
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆20Updated last year
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆22Updated 10 months ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated last year
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Updated 3 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆58Updated 5 months ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆113Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- Parses Cobalt Strike malleable C2 profiles.☆58Updated this week
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- To audit the security of read-only domain controllers☆118Updated last year
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆34Updated 5 months ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆67Updated last year