☆125Mar 23, 2025Updated last year
Alternatives and similar repositories for WAREED-DNS-C2
Users that are interested in WAREED-DNS-C2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Jul 23, 2023Updated 2 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆251Jun 11, 2024Updated last year
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆623Feb 21, 2024Updated 2 years ago
- Golang implement winrm client with pass the hash☆32Apr 29, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆148Oct 29, 2024Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆627Jan 2, 2025Updated last year
- Inject DLLs into the explorer process using icons☆408May 18, 2025Updated 11 months ago
- Generic PE loader for fast prototyping evasion techniques☆245Jul 2, 2024Updated last year
- ☆245Sep 19, 2023Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆111Mar 25, 2024Updated 2 years ago
- ☆122Nov 21, 2024Updated last year
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Process injection alternative☆407Sep 6, 2024Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆467Aug 2, 2024Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆287Apr 17, 2023Updated 3 years ago
- Bypassing UAC with SSPI Datagram Contexts☆466Sep 24, 2023Updated 2 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆328Apr 12, 2024Updated 2 years ago
- Remove AV/EDR Kernel ObRegisterCallbacks、CmRegisterCallback、MiniFilter Callback、PsSetCreateProcessNotifyRoutine Callback、PsSetCreateThrea…☆1,321Jun 21, 2024Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆226Jul 25, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆204Apr 21, 2025Updated last year
- AV bypass while you sip your Chai!☆222May 17, 2024Updated last year
- A BOF that runs unmanaged PEs inline☆698Oct 23, 2024Updated last year
- ☆346Nov 10, 2025Updated 5 months ago
- ☆142Jun 21, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,016Jun 4, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆285Apr 6, 2025Updated last year
- Shoggoth: Asmjit Based Polymorphic Encryptor☆788Apr 4, 2026Updated last month
- Bypass LSA protection using the BYODLL technique☆178Sep 21, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Sleep obfuscation☆276Dec 13, 2024Updated last year
- PoCs for Kernelmode rootkit techniques research.☆439Mar 25, 2026Updated last month
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- A C# Command & Control framework☆1,032Mar 28, 2024Updated 2 years ago
- An implementation of an indirect system call☆132Aug 25, 2023Updated 2 years ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆724Jul 19, 2023Updated 2 years ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆721May 7, 2025Updated last year