Lavender-exe / Hades-C2
Hades Basic Command & Control Server
☆84Updated last year
Alternatives and similar repositories for Hades-C2:
Users that are interested in Hades-C2 are comparing it to the libraries listed below
- A C2 framework built for my bachelors thesis☆56Updated 3 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆109Updated 3 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 9 months ago
- An interactive shell to spoof some LOLBins command line☆182Updated last year
- Automated .NET AppDomain hijack payload generation☆119Updated 2 weeks ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- PowerShell Obfuscator☆112Updated 8 months ago
- PowerShell Reverse Shell☆61Updated last year
- A shellcode injection tool showcasing various process injection techniques☆135Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆161Updated 11 months ago
- A collection of Cobalt Strike Aggressor scripts.☆91Updated 3 years ago
- ☆26Updated last year
- Just some random Red Team Scripts that can be useful☆148Updated 7 months ago
- ☆84Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- Continuous password spraying tool☆128Updated last week
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆158Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 4 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆78Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆163Updated 8 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆103Updated 3 weeks ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 8 months ago
- 「💀」Proof of concept on BYOVD attack☆154Updated 2 months ago
- ☆139Updated 6 months ago
- ☆47Updated 2 years ago
- ☆113Updated last year
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆42Updated last month