CodeXTF2 / HavocNotion
A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally safe or stable, built as a PoC to showcase Havoc C2's modular C2 channel interface.
☆78Updated last year
Related projects: ⓘ
- C# havoc implant☆90Updated last year
- I have documented all of the AMSI patches that I learned till now☆66Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆137Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆84Updated last year
- ☆87Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆50Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆95Updated last year
- ☆61Updated 2 years ago
- Lateral Movement via the .NET Profiler☆74Updated 3 months ago
- Automating payload generation for OSEP labs and exam.☆34Updated 2 years ago
- ☆65Updated this week
- ☆99Updated this week
- ☆70Updated last year
- ☆135Updated 2 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆108Updated last year
- Do some DLL SideLoading magic☆72Updated 11 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆147Updated 10 months ago
- ☆116Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆72Updated 2 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆81Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆55Updated 5 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆76Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆74Updated last year
- ☆132Updated last year
- Simple BOF to read the protection level of a process☆101Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆60Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 9 months ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆136Updated 6 months ago
- Beacon Object File allowing creation of Beacons in different sessions.☆73Updated 2 years ago