CodeXTF2 / WindowSpy
WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
☆264Updated last month
Alternatives and similar repositories for WindowSpy:
Users that are interested in WindowSpy are comparing it to the libraries listed below
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 10 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆289Updated last year
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆396Updated 9 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆161Updated last year
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- Evasive Golang Loader☆129Updated 7 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆246Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆135Updated last year
- ☆162Updated 7 months ago
- A shellcode injection tool showcasing various process injection techniques☆134Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆92Updated 3 years ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- ☆164Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆299Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆71Updated 3 years ago
- 「💀」Proof of concept on BYOVD attack☆155Updated 3 months ago
- COM Hijacking VOODOO☆268Updated 2 weeks ago
- Modules used by the Havoc Framework☆224Updated 9 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆231Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookie☆192Updated 10 months ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆296Updated 2 years ago
- A BOF to automate common persistence tasks for red teamers☆273Updated 2 years ago
- Shaco is a linux agent for havoc☆156Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆118Updated 8 months ago
- ☆195Updated last month
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆196Updated 8 months ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆253Updated last year