DominicBreuker / SliverSamplesLinks
A collection of sample code used in some experiments with Sliver C2
☆13Updated 2 years ago
Alternatives and similar repositories for SliverSamples
Users that are interested in SliverSamples are comparing it to the libraries listed below
Sorting:
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- A simple rpc2socks alternative in pure Go.☆28Updated 10 months ago
- ☆23Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆32Updated last month
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 11 months ago
- Some of my custom "tools".☆23Updated 3 years ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- ☆48Updated last year
- Nemesis agent for Mythic☆27Updated 9 months ago
- ELF Beacon Object File (BOF) Template☆19Updated 6 months ago
- BOF for C2 framework☆41Updated 6 months ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 2 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆16Updated last year
- ☆25Updated 3 months ago
- ☆48Updated 2 years ago
- ☆18Updated 5 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆23Updated 2 weeks ago
- Proxy function calls through the thread pool with ease☆28Updated 3 months ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 7 months ago
- An In-memory Embedding of CPython☆28Updated 4 years ago