Immersive-Labs-Sec / HavocC2-ForensicsLinks
A set of tools and resources for analysis of Havoc C2
☆24Updated last year
Alternatives and similar repositories for HavocC2-Forensics
Users that are interested in HavocC2-Forensics are comparing it to the libraries listed below
Sorting:
- ☆161Updated 7 months ago
 - BSides Prishtina 2024 Malware Development and Persistence workshop☆104Updated 5 months ago
 - POC of GITHUB simple C2 in rust☆52Updated 3 months ago
 - Vibe Malware Triage - MCP server for static PE analysis.☆71Updated 5 months ago
 - ☆70Updated 9 months ago
 - Convert your shellcode into an ASCII string☆124Updated 4 months ago
 - ☆157Updated 4 months ago
 - Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆72Updated last year
 - Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆37Updated last month
 - Bypass user-land hooks by syscall tampering via the Trap Flag☆129Updated 2 months ago
 - Utilities for obfuscating shellcode☆94Updated last month
 - Windows Administrator level Implant.☆49Updated last year
 - Situational Awareness script to identify how and where to run implants☆67Updated 10 months ago
 - Permanently disable EDRs as local admin☆119Updated 3 weeks ago
 - ☆144Updated last month
 - ☆39Updated 10 months ago
 - A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
 - The different ways to dump lsass☆193Updated 2 months ago
 - ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
 - A python script to automatically list vulnerable Windows ACEs/ACLs.☆61Updated 4 months ago
 - Backdooring VSCode Projects☆80Updated 4 months ago
 - Execute shellcode via ASPNET compiler☆58Updated last month
 - The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆58Updated 2 months ago
 - ☆108Updated last year
 - An interactive shell to spoof some LOLBins command line☆186Updated last year
 - Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago
 - This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆42Updated last year
 - OFFZONE 2024 Malware Persistence workshop☆21Updated 10 months ago
 - RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 7 months ago
 - ☆85Updated last year