HavocFramework / havoc-pyLinks
Havoc python api
☆43Updated 2 years ago
Alternatives and similar repositories for havoc-py
Users that are interested in havoc-py are comparing it to the libraries listed below
Sorting:
- (Demo) 3rd party agent for Havoc☆147Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆75Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- C# havoc implant☆101Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆87Updated 2 years ago
- A C2 framework built for my bachelors thesis☆56Updated last year
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆107Updated 7 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆56Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆86Updated 2 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- Public repo of some woking evilginx phishlets☆39Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆131Updated 10 months ago
- Living Off the Foreign Land setup scripts☆72Updated 9 months ago
- A collection of Cobalt Strike Aggressor scripts.☆105Updated 3 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆124Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 8 months ago
- POC for frustrating/defeating Malware Analysts☆157Updated 3 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆40Updated 2 months ago
- Collection of random RedTeam scripts.☆207Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated 11 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆92Updated last year
- ☆120Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆101Updated 8 months ago
- Slide decks and/or materials from conference presentations☆56Updated 3 years ago