IncludeSecurity / c2-vulnerabilities
PoCs of RCEs against open source C2 servers
☆46Updated last month
Related projects ⓘ
Alternatives and complementary repositories for c2-vulnerabilities
- Create Anti-Copy DRM Malware☆46Updated 3 months ago
- ☆62Updated 9 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆72Updated 9 months ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆76Updated 2 years ago
- ☆73Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated last month
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated 10 months ago
- I have documented all of the AMSI patches that I learned till now☆68Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆88Updated 9 months ago
- TeamServer and Client of Exploration Command and Control Framework☆68Updated this week
- Parses Cobalt Strike malleable C2 profiles.☆48Updated this week
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆82Updated 2 years ago
- Winsocket for Cobalt Strike.☆98Updated last year
- Lateral Movement via the .NET Profiler