IncludeSecurity / c2-vulnerabilities
PoCs of RCEs against open source C2 servers
☆79Updated 6 months ago
Alternatives and similar repositories for c2-vulnerabilities:
Users that are interested in c2-vulnerabilities are comparing it to the libraries listed below
- To audit the security of read-only domain controllers☆115Updated last year
- ApexLdr is a DLL Payload Loader written in C☆108Updated 9 months ago
- Create Anti-Copy DRM Malware☆55Updated 7 months ago
- ☆224Updated 11 months ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆80Updated 3 years ago
- Port of Cobalt Strike's Process Inject Kit☆171Updated 4 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆204Updated last year
- Library of BOFs to interact with SQL servers☆163Updated last week
- Execute commands in other Sessions☆86Updated 8 months ago
- ☆86Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆193Updated 5 months ago
- ☆48Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆113Updated 2 weeks ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆147Updated 6 months ago
- Local & remote Windows DLL Proxying☆164Updated 10 months ago
- A Tool that aims to evade av with binary padding☆147Updated 9 months ago
- TeamServer and Client of Exploration Command and Control Framework☆122Updated 2 weeks ago
- Evasive Golang Loader☆131Updated 8 months ago
- A C# port from Invoke-GhostTask☆114Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆119Updated 6 months ago
- ☆65Updated 3 months ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆105Updated 2 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆137Updated 3 months ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- Lateral Movement☆122Updated last year
- Active Directory Authentication Library☆62Updated last week
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆131Updated 5 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆204Updated last year
- ☆164Updated 8 months ago