EvilWhales / RProxy-LABLinks
RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools
☆48Updated last month
Alternatives and similar repositories for RProxy-LAB
Users that are interested in RProxy-LAB are comparing it to the libraries listed below
Sorting:
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- .NET tool used to enrich RPC telemetry☆101Updated 2 weeks ago
- Malware traffic obfuscation library☆39Updated 6 months ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.☆180Updated 3 weeks ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Updated 6 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Updated 2 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 5 months ago
- ☆48Updated 2 months ago
- A command and control framework.☆54Updated last year
- ☆55Updated 2 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 11 months ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆131Updated 5 months ago
- 🔒 Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built wi…☆124Updated last month
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Updated 2 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Updated 7 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆140Updated 2 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Updated 4 months ago
- Docker container for running CobaltStrike 4.10☆38Updated last year
- A portable C# utility for enumerating local and remote windows sessions☆55Updated last month
- ☆59Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Updated 7 months ago
- ☆71Updated last month
- Abusing SSRF to deliver an authenticated command injection payload☆30Updated 5 months ago
- Enumerate active EDR's on the system☆150Updated 4 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated last year
- Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.☆51Updated 3 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆69Updated this week
- Convert your shellcode into an ASCII string☆127Updated 7 months ago
- A simple website to act as a store for havoc modules and extensions☆28Updated last year