Enelg52 / KittyStager
KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this project is to be able to have a web server and some kitten and be able to use the with any shellcode.
☆213Updated last year
Related projects: ⓘ
- ☆232Updated last year
- (Demo) 3rd party agent for Havoc☆124Updated last year
- Patching AmsiOpenSession by forcing an error branching☆141Updated last year
- ☆172Updated 9 months ago
- 「💀」Proof of concept on BYOVD attack☆147Updated 6 months ago
- Shaco is a linux agent for havoc☆137Updated 10 months ago
- Modules used by the Havoc Framework☆191Updated 3 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆164Updated 8 months ago
- Run Your Payload Without Running Your Payload☆174Updated last year
- ☆238Updated this week
- Execute shellcode files with rundll32☆171Updated 7 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆316Updated 2 months ago
- Patch AMSI and ETW☆227Updated 4 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆219Updated last year
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆59Updated last year
- ☆290Updated last year
- Evasive Golang Loader☆129Updated last month
- PE obfuscator with Evasion in mind☆210Updated last year
- transform your payload into ipv4/ipv6/mac arrays☆140Updated 2 years ago
- Exploitation of process killer drivers☆182Updated 11 months ago
- A BOF to automate common persistence tasks for red teamers☆263Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆128Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆282Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆142Updated 3 months ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆163Updated last year
- Native Syscalls Shellcode Injector☆259Updated last year
- Weaponized HellsGate/SigFlip☆188Updated last year
- ☆245Updated this week
- ☆179Updated this week
- WIP shellcode loader in nim with EDR evasion techniques☆208Updated 2 years ago