Open Source Implementation of Cobalt Strike's Malleable C2
☆98Jan 27, 2026Updated 3 months ago
Alternatives and similar repositories for OpenMalleableC2
Users that are interested in OpenMalleableC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 9 months ago
- ☆38Oct 16, 2025Updated 6 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated last month
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆51Jan 28, 2026Updated 3 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆128Jan 7, 2026Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Red Team tools containerized☆76Mar 25, 2026Updated last month
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year
- Let's make quick work of GraphQL instances ;)☆26Mar 8, 2026Updated last month
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated last year
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆75Jan 19, 2026Updated 3 months ago
- ACL Viewer for Windows☆133May 4, 2025Updated 11 months ago
- ☆85Feb 12, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 2 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆100Jan 10, 2026Updated 3 months ago
- The Azure Execution Tool☆155Feb 6, 2026Updated 2 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated 2 months ago
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆27Mar 19, 2025Updated last year
- command control framework☆33Apr 3, 2026Updated 3 weeks ago
- Project for generating and identifying deceptive LNK files.☆330Mar 8, 2026Updated last month
- Self-mutating macOS implant☆129Apr 18, 2026Updated last week
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆440Jun 27, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan …☆213Dec 8, 2025Updated 4 months ago
- A Proof-of-Concept implementation of Reflective DLL Injection (RDI) specifically for Windows on ARM64. Demonstrates PEB access via the x1…☆35May 30, 2025Updated 10 months ago
- Threat Hunting queries of multiple platforms☆66Apr 17, 2026Updated last week
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 10 months ago
- Tool for playing with Windows Access Token manipulation.☆83Nov 28, 2022Updated 3 years ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆76Dec 10, 2025Updated 4 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated 2 weeks ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆59Apr 10, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Linux Process Injection via Seccomp Notifier☆94Dec 9, 2025Updated 4 months ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Jun 30, 2025Updated 9 months ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆53Dec 21, 2023Updated 2 years ago
- PowerShell implementation for AD CS☆120Mar 2, 2026Updated last month
- ☆55Oct 13, 2025Updated 6 months ago
- ☆39Mar 28, 2025Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆384Oct 14, 2025Updated 6 months ago