Open Source Implementation of Cobalt Strike's Malleable C2
☆96Jan 27, 2026Updated last month
Alternatives and similar repositories for OpenMalleableC2
Users that are interested in OpenMalleableC2 are comparing it to the libraries listed below
Sorting:
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 8 months ago
- ☆38Oct 16, 2025Updated 5 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆23Feb 26, 2026Updated 3 weeks ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 11 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆124Jan 7, 2026Updated 2 months ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated last year
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆69Jan 19, 2026Updated 2 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 11 months ago
- ☆77Feb 12, 2026Updated last month
- Project for generating and identifying deceptive LNK files.☆296Mar 8, 2026Updated last week
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆69Feb 5, 2026Updated last month
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated 2 months ago
- The Azure Execution Tool☆139Feb 6, 2026Updated last month
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆128Feb 17, 2026Updated last month
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆27Mar 19, 2025Updated last year
- command control framework☆32Mar 4, 2026Updated 2 weeks ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆438Jun 27, 2025Updated 8 months ago
- Self-mutating macOS implant☆125Updated this week
- Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan …☆207Dec 8, 2025Updated 3 months ago
- A Proof-of-Concept implementation of Reflective DLL Injection (RDI) specifically for Windows on ARM64. Demonstrates PEB access via the x1…☆34May 30, 2025Updated 9 months ago
- PowerShell implementation for AD CS☆115Mar 2, 2026Updated 2 weeks ago
- Threat Hunting queries of multiple platforms☆63Feb 26, 2026Updated 3 weeks ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 9 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆116Oct 30, 2025Updated 4 months ago
- Tool for playing with Windows Access Token manipulation.☆82Nov 28, 2022Updated 3 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆75Dec 10, 2025Updated 3 months ago
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 3 months ago
- ACL Viewer for Windows☆133May 4, 2025Updated 10 months ago
- Red Team tools containerized☆76Dec 6, 2025Updated 3 months ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆53Dec 21, 2023Updated 2 years ago
- ☆54Oct 13, 2025Updated 5 months ago
- ☆38Mar 28, 2025Updated 11 months ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 5 months ago
- This code silently installs Chrome extensions on Mac, Windows, and Linux☆131Jul 22, 2025Updated 7 months ago
- ☆37Feb 27, 2026Updated 3 weeks ago
- A comprehensive collection of Open Source Intelligence (OSINT) tools and resources for cybersecurity professionals, researchers, and inve…☆28Feb 4, 2026Updated last month