Havoc C2 profile generator
☆108Mar 4, 2026Updated 2 months ago
Alternatives and similar repositories for havoc_profile_generator
Users that are interested in havoc_profile_generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 3 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆313Dec 9, 2023Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆287Apr 17, 2023Updated 3 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Shaco is a linux agent for havoc☆169Oct 25, 2023Updated 2 years ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆189Mar 14, 2025Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆389Jul 30, 2024Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆197Feb 6, 2025Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆46Aug 16, 2024Updated last year
- Reaping treasures from strings in remote processes memory☆287Feb 8, 2025Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆623Feb 21, 2024Updated 2 years ago
- ☆235Oct 8, 2024Updated last year
- A Beacon Object File (BOF) is a compiled C program, written to a convention that allows it to execute within a Beacon process and use int…☆267Nov 24, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sniffing files generator☆62Feb 24, 2025Updated last year
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- Your Skyfall Infrastructure Pack☆99Apr 10, 2026Updated 3 weeks ago
- ☆147Nov 6, 2025Updated 6 months ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆148May 30, 2022Updated 3 years ago
- ☆36Jan 23, 2025Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆61Dec 11, 2024Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆399Oct 6, 2024Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆379Apr 19, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆101Mar 20, 2023Updated 3 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆296May 1, 2026Updated last week
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆134Oct 4, 2024Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆517May 19, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆192Jan 17, 2026Updated 3 months ago
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆690Aug 15, 2025Updated 8 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆552May 9, 2025Updated 11 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆594Jan 20, 2026Updated 3 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆350Nov 19, 2024Updated last year