☆125Mar 23, 2025Updated last year
Alternatives and similar repositories for WAREED-DNS-C2
Users that are interested in WAREED-DNS-C2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Jul 23, 2023Updated 2 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆250Jun 11, 2024Updated last year
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆619Feb 21, 2024Updated 2 years ago
- Golang implement winrm client with pass the hash☆32Apr 29, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆146Oct 29, 2024Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆622Jan 2, 2025Updated last year
- Inject DLLs into the explorer process using icons☆407May 18, 2025Updated 11 months ago
- Generic PE loader for fast prototyping evasion techniques☆245Jul 2, 2024Updated last year
- ☆245Sep 19, 2023Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- ☆122Nov 21, 2024Updated last year
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆109Mar 25, 2024Updated 2 years ago
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Process injection alternative☆407Sep 6, 2024Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆463Aug 2, 2024Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆281Apr 17, 2023Updated 3 years ago
- Bypassing UAC with SSPI Datagram Contexts☆466Sep 24, 2023Updated 2 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆328Apr 12, 2024Updated 2 years ago
- Remove AV/EDR Kernel ObRegisterCallbacks、CmRegisterCallback、MiniFilter Callback、PsSetCreateProcessNotifyRoutine Callback、PsSetCreateThrea…☆1,311Jun 21, 2024Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆225Jul 25, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆204Apr 21, 2025Updated 11 months ago
- AV bypass while you sip your Chai!☆223May 17, 2024Updated last year
- A BOF that runs unmanaged PEs inline☆694Oct 23, 2024Updated last year
- ☆345Nov 10, 2025Updated 5 months ago
- ☆143Jun 21, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,011Jun 4, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆286Apr 6, 2025Updated last year
- Shoggoth: Asmjit Based Polymorphic Encryptor☆783Apr 4, 2026Updated 2 weeks ago
- Bypass LSA protection using the BYODLL technique☆178Sep 21, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Sleep obfuscation☆272Dec 13, 2024Updated last year
- PoCs for Kernelmode rootkit techniques research.☆437Mar 25, 2026Updated 3 weeks ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- A C# Command & Control framework☆1,030Mar 28, 2024Updated 2 years ago
- An implementation of an indirect system call☆132Aug 25, 2023Updated 2 years ago
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆722Jul 19, 2023Updated 2 years ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆701May 7, 2025Updated 11 months ago