Immersive-Labs-Sec / HavocC2-ForensicsLinks
A set of tools and resources for analysis of Havoc C2
☆22Updated last year
Alternatives and similar repositories for HavocC2-Forensics
Users that are interested in HavocC2-Forensics are comparing it to the libraries listed below
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆98Updated 4 months ago
- ☆160Updated 7 months ago
- Utilities for obfuscating shellcode☆94Updated 3 weeks ago
- Convert your shellcode into an ASCII string☆120Updated 3 months ago
- ☆158Updated 3 months ago
- The different ways to dump lsass☆190Updated last month
- Bypass user-land hooks by syscall tampering via the Trap Flag☆125Updated last month
- Vibe Malware Triage - MCP server for static PE analysis.☆70Updated 4 months ago
- POC of GITHUB simple C2 in rust☆53Updated 2 months ago
- Situational Awareness script to identify how and where to run implants☆65Updated 10 months ago
- Obex – Blocking unwanted DLLs in user mode☆227Updated 3 weeks ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- OFFZONE 2024 Malware Persistence workshop☆20Updated 9 months ago
- Permanently disable EDRs as local admin☆116Updated 3 months ago
- ☆134Updated last week
- Execute shellcode via ASPNET compiler☆49Updated last week
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆168Updated 4 months ago
- ☆108Updated 11 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆84Updated last month
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆31Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆115Updated 8 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 7 months ago
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆52Updated 9 months ago
- Windows Administrator level Implant.☆49Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 7 months ago
- ☆30Updated last month
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆152Updated 2 weeks ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆155Updated 2 months ago
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆192Updated last week