βοΈπ€« Stealth redirector for your red team operation security
β1,069Mar 1, 2026Updated last month
Alternatives and similar repositories for BounceBack
Users that are interested in BounceBack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Beacon Object Files (BOF) for Cobalt Strikeβ685Aug 15, 2025Updated 7 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.β444Dec 21, 2023Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.β622Jan 2, 2025Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniβ¦β1,375Oct 27, 2023Updated 2 years ago
- HVNC for Cobalt Strikeβ1,314Dec 7, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird β¦β791Jan 26, 2026Updated 2 months ago
- A BOF that runs unmanaged PEs inlineβ690Oct 23, 2024Updated last year
- Real fucking shellcode encryptor & obfuscator toolβ1,018Jan 7, 2026Updated 3 months ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.β1,204Apr 16, 2025Updated 11 months ago
- Cobalt Strike UDRL for memory scanner evasion.β1,009Jun 4, 2024Updated last year
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.β1,563Aug 20, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Frameworkβ639May 8, 2025Updated 11 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.β311Dec 9, 2023Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.β587Jan 20, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Analyse your malware to surgically obfuscate itβ527Dec 17, 2025Updated 3 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phanβ¦β283Sep 18, 2024Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the β¦β1,849Nov 3, 2024Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.β1,198Oct 16, 2023Updated 2 years ago
- Remote operations commands implemented using Beacon Object Filesβ1,146Mar 5, 2026Updated last month
- Cobalt Strike HTTPS beaconing over Microsoft Graph APIβ629Jun 25, 2024Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFsβ617Feb 21, 2024Updated 2 years ago
- Execute unmanaged Windows executables in CobaltStrike Beaconsβ717Mar 4, 2023Updated 3 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.β¦β906Updated this week
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the β¦β569Jun 5, 2023Updated 2 years ago
- New generation of wmiexec.pyβ1,277Mar 24, 2026Updated 3 weeks ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfveβ¦β593Jun 12, 2024Updated last year
- Terminate AV/EDR Processes using kernel driverβ354Jun 12, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Direβ¦β867Feb 3, 2024Updated 2 years ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).β589Mar 19, 2024Updated 2 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.β282Feb 24, 2025Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercerβ742May 19, 2023Updated 2 years ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.β514May 19, 2025Updated 10 months ago
- Deploy open-source AI quickly and easily - Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.β413Jan 11, 2026Updated 3 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).β558Nov 23, 2025Updated 4 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!β1,409Nov 22, 2023Updated 2 years ago
- Nameless C2 - A C2 with all its components written in Rustβ286Sep 26, 2024Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Techniqueβ158Nov 7, 2023Updated 2 years ago
- β720Mar 22, 2024Updated 2 years ago
- Threadless Process Injection using remote function hooking.β811Sep 4, 2024Updated last year