DominicBreuker / SliverSamplesLinks
A collection of sample code used in some experiments with Sliver C2
☆14Updated 2 years ago
Alternatives and similar repositories for SliverSamples
Users that are interested in SliverSamples are comparing it to the libraries listed below
Sorting:
- ☆47Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Updated 2 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆28Updated 6 months ago
- Some of my custom "tools".☆29Updated 3 years ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- ☆18Updated last year
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- Golang Implementation of Hell's gate☆20Updated 2 years ago
- ☆23Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆44Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 4 months ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Updated 3 years ago
- An In-memory Embedding of CPython☆30Updated 4 years ago
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- ☆60Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated 2 years ago
- in-process powershell runner for BRC4☆48Updated 2 years ago
- Python module for running BOFs☆74Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Updated 2 years ago
- ☆60Updated 4 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Updated 9 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28Updated last year
- BOF for C2 framework☆44Updated last year
- ☆36Updated 9 months ago