DominicBreuker / SliverSamplesLinks
A collection of sample code used in some experiments with Sliver C2
☆16Updated 2 years ago
Alternatives and similar repositories for SliverSamples
Users that are interested in SliverSamples are comparing it to the libraries listed below
Sorting:
- ☆47Updated 2 years ago
- ☆23Updated last year
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Updated 2 years ago
- An In-memory Embedding of CPython☆31Updated 4 years ago
- Golang Implementation of Hell's gate☆21Updated 2 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆44Updated last year
- Some of my custom "tools".☆29Updated 3 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Updated 2 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆29Updated 6 months ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 5 months ago
- ☆24Updated last year
- Python module for running BOFs☆79Updated 3 weeks ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated 2 years ago
- ☆37Updated 11 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Updated 2 years ago
- ☆61Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago
- A simple Linux in-memory .so loader☆33Updated 2 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 3 years ago
- ☆59Updated last year
- ☆18Updated last year