Im-Adriano / BattlePaddleLinks
A C2 Bot using Raw Sockets on both Windows and Linux
☆8Updated 4 years ago
Alternatives and similar repositories for BattlePaddle
Users that are interested in BattlePaddle are comparing it to the libraries listed below
Sorting:
- Raw socket library/framework for red team events☆34Updated 2 years ago
- In 'n Out - See what goes in and comes out of PEs☆35Updated 3 years ago
- Shellcode process injector☆28Updated 5 years ago
- Deploy redteam infrastructure☆16Updated 4 years ago
- C2 over web☆8Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- An async Python client library for Empire's RESTful API☆25Updated last year
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 4 years ago
- A logging ASKPASS binary☆29Updated 5 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- pypykatz plugin for volatility3 framework☆40Updated last month
- Sustainable shellcode evasion☆109Updated 7 months ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- ☆67Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- ☆48Updated 4 years ago
- DNS server for pentesters☆49Updated 3 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Offensive go lang series☆33Updated 5 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆64Updated 5 years ago