DragoQCC / CrucibleC2
A C# Command & Control framework
☆991Updated last year
Alternatives and similar repositories for CrucibleC2:
Users that are interested in CrucibleC2 are comparing it to the libraries listed below
- ☆689Updated last year
- A DLL loader with advanced evasive features☆707Updated 2 years ago
- Execute unmanaged Windows executables in CobaltStrike Beacons☆657Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,200Updated last year
- Command and Control Framework written in C#☆394Updated last year
- ☆703Updated last year
- ☆467Updated 4 months ago
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆732Updated last week
- Another Windows Local Privilege Escalation from Service Account to System☆838Updated 2 years ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆929Updated last year
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆791Updated 8 months ago
- HVNC for Cobalt Strike☆1,204Updated last year
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆956Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆368Updated 5 months ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆424Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,172Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆708Updated 2 months ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆805Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆576Updated 9 months ago
- Dominate Active Directory with PowerShell. Inspired by CrackMapExec / NetExec.☆950Updated 2 weeks ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆374Updated 7 months ago
- Protected Process Dumper Tool☆533Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆494Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆300Updated last year
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,075Updated 11 months ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆841Updated 2 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆512Updated 9 months ago
- Loads any C# binary in mem, patching AMSI + ETW.☆819Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆912Updated 9 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆508Updated this week