Enelg52 / KittyStagerLinks
KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this project is to be able to have a web server and some kitten and be able to use the with any shellcode.
☆222Updated 2 years ago
Alternatives and similar repositories for KittyStager
Users that are interested in KittyStager are comparing it to the libraries listed below
Sorting:
- WIP shellcode loader in nim with EDR evasion techniques☆220Updated 3 years ago
- ☆245Updated 2 years ago
- A C2 framework for initial access in Go☆193Updated 3 years ago
- ☆170Updated last year
- A BOF to automate common persistence tasks for red teamers☆289Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆148Updated 2 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆336Updated last year
- Execute shellcode files with rundll32☆207Updated last year
- Shaco is a linux agent for havoc☆167Updated last year
- Modules used by the Havoc Framework☆252Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆355Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆236Updated 2 years ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆194Updated 2 years ago
- PE obfuscator with Evasion in mind☆213Updated 2 years ago
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆207Updated 2 years ago
- indirect syscalls for AV/EDR evasion in Go assembly☆339Updated 2 years ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆308Updated 2 years ago
- ☆194Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆323Updated 2 years ago
- ☆209Updated 5 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆141Updated 2 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆176Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆310Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆124Updated 3 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆89Updated 2 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆259Updated 2 years ago
- (Demo) 3rd party agent for Havoc☆144Updated 2 years ago
- Patch AMSI and ETW☆246Updated last year
- Generate Shellcode Loaders & Injects☆156Updated 2 years ago