J0LGER / Venom
Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.
☆17Updated 2 years ago
Alternatives and similar repositories for Venom:
Users that are interested in Venom are comparing it to the libraries listed below
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- ☆25Updated last year
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 3 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆109Updated 2 years ago
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆15Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆37Updated 2 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 2 years ago
- ☆51Updated 3 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆34Updated 2 years ago
- PoC-Malware-TTPs☆49Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- ☆17Updated 6 months ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- Simple Shellcode Loader tool☆25Updated last year
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated last year
- ☆14Updated 2 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆27Updated 2 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆51Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Cobalt Strike Aggressor scripts☆9Updated 2 years ago