Open Source Implementation of Cobalt Strike's Malleable C2
☆100Jan 27, 2026Updated 3 months ago
Alternatives and similar repositories for OpenMalleableC2
Users that are interested in OpenMalleableC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 10 months ago
- ☆41Oct 16, 2025Updated 7 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆26Mar 19, 2026Updated 2 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆129Jan 7, 2026Updated 4 months ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆54Jan 28, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Red Team tools containerized☆77May 12, 2026Updated last week
- ☆28Mar 6, 2026Updated 2 months ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated 2 years ago
- Let's make quick work of GraphQL instances ;)☆26Mar 8, 2026Updated 2 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆24Apr 16, 2025Updated last year
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆77Jan 19, 2026Updated 4 months ago
- ACL Viewer for Windows☆133May 4, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆85Feb 12, 2026Updated 3 months ago
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 3 months ago
- The Azure Execution Tool☆156Feb 6, 2026Updated 3 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆103Jan 10, 2026Updated 4 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆133Feb 17, 2026Updated 3 months ago
- command control framework☆33May 10, 2026Updated last week
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆27Mar 19, 2025Updated last year
- Project for generating and identifying deceptive LNK files.☆336Mar 8, 2026Updated 2 months ago
- Self-mutating macOS implant☆135Apr 18, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆444Jun 27, 2025Updated 10 months ago
- Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan …☆213Dec 8, 2025Updated 5 months ago
- Threat Hunting queries of multiple platforms☆68Apr 30, 2026Updated 2 weeks ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 11 months ago
- Tool for playing with Windows Access Token manipulation.☆83Nov 28, 2022Updated 3 years ago
- A Proof-of-Concept implementation of Reflective DLL Injection (RDI) specifically for Windows on ARM64. Demonstrates PEB access via the x1…☆36May 30, 2025Updated 11 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆77Dec 10, 2025Updated 5 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Linux Process Injection via Seccomp Notifier☆96Dec 9, 2025Updated 5 months ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Jun 30, 2025Updated 10 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆59Apr 10, 2026Updated last month
- Win32 keylogger that supports all (non-ime using) languages correctly☆54Dec 21, 2023Updated 2 years ago
- PowerShell implementation for AD CS☆153Mar 2, 2026Updated 2 months ago
- ☆55Oct 13, 2025Updated 7 months ago
- ☆39Mar 28, 2025Updated last year