KittenBusters / CharmingKittenLinks
Exposing CharmingKitten's malicious activity for IRGC-IO Counterintelligence division (1500)
☆426Updated 3 months ago
Alternatives and similar repositories for CharmingKitten
Users that are interested in CharmingKitten are comparing it to the libraries listed below
Sorting:
- Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bo…☆505Updated last week
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago
- Embed a payload inside a PNG file☆368Updated last year
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆432Updated 3 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆507Updated 5 months ago
- ☆341Updated this week
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆446Updated this week
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆423Updated 3 months ago
- SharePoint WebPart Injection Exploit Tool☆311Updated 2 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆364Updated 5 months ago
- Lockbit, URSIF, BlackBasta etc.☆222Updated 3 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆153Updated 11 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆177Updated 8 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆217Updated 3 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Updated last year
- ☆378Updated 3 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆222Updated 9 months ago
- ☆332Updated 5 months ago
- RunPE implementation with multiple evasive techniques (2)☆268Updated 4 months ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆224Updated 5 months ago
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆544Updated last month
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆298Updated 2 months ago
- A delicious, but malicious SSL-VPN server 🌮☆261Updated 4 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆206Updated last year
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆255Updated last week
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆261Updated 9 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆312Updated last month
- PoC that downloads an executable from a public SSL certificate☆136Updated 6 months ago
- PowerShell Obfuscator☆229Updated 5 months ago