CodeXTF2 / WindowSpy
WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
☆265Updated last month
Alternatives and similar repositories for WindowSpy:
Users that are interested in WindowSpy are comparing it to the libraries listed below
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 11 months ago
- A shellcode injection tool showcasing various process injection techniques☆134Updated last year
- ☆164Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆403Updated 10 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆233Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆136Updated last year
- ☆164Updated 8 months ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆152Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆171Updated 2 years ago
- ☆276Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆94Updated 3 years ago
- 「💀」Proof of concept on BYOVD attack☆157Updated 4 months ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆194Updated 11 months ago
- Run Your Payload Without Running Your Payload☆181Updated 2 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆156Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆300Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆186Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆253Updated last year
- Patching AmsiOpenSession by forcing an error branching☆145Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.☆159Updated last year
- ☆215Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 11 months ago
- AV bypass while you sip your Chai!☆220Updated 11 months ago
- ☆165Updated 2 years ago
- ☆163Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆70Updated 3 years ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- Continuous password spraying tool☆180Updated last month
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- Kill AV/EDR leveraging BYOVD attack☆351Updated last year