Darkrain2009 / RedExt
Chrome browser extension-based Command & Control
☆117Updated 2 months ago
Alternatives and similar repositories for RedExt:
Users that are interested in RedExt are comparing it to the libraries listed below
- ☆174Updated 2 weeks ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆153Updated last month
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆136Updated 2 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆119Updated 6 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆147Updated 6 months ago
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆88Updated last week
- A Mythic agent for Windows written in C☆115Updated last week
- .bin file to shellcode convertor☆34Updated 9 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆136Updated 3 weeks ago
- A C# port from Invoke-GhostTask☆114Updated last year
- ☆152Updated 8 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆86Updated 9 months ago
- Port of Cobalt Strike's Process Inject Kit☆171Updated 4 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆65Updated 10 months ago
- TeamServer and Client of Exploration Command and Control Framework☆122Updated 2 weeks ago
- Inject RDPThief into memory with PowerShell.☆62Updated 2 months ago
- Abuse leaked token handles.☆132Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆14Updated last week
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆47Updated 2 months ago
- Stage 0☆155Updated 4 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆171Updated 2 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 11 months ago
- Havoc C2 profile generator☆77Updated 5 months ago
- My implementation of the GIUDA project in C++☆180Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆73Updated last month
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆196Updated 5 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆127Updated 4 months ago
- Our Tips&Tricks☆115Updated 2 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 10 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆113Updated 2 weeks ago