Lavender-exe / Hades-C2
Hades Basic Command & Control Server
☆86Updated last year
Alternatives and similar repositories for Hades-C2:
Users that are interested in Hades-C2 are comparing it to the libraries listed below
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆111Updated this week
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 10 months ago
- PowerShell Reverse Shell☆61Updated last year
- PowerShell Obfuscator☆114Updated 9 months ago
- Repo for all my exploits/PoCs☆48Updated 3 weeks ago
- A collection of Cobalt Strike Aggressor scripts.☆92Updated 3 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 10 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆70Updated 3 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆44Updated 2 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆75Updated 5 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆159Updated 3 months ago
- ☆84Updated 2 years ago
- ☆63Updated 11 months ago
- ☆103Updated 6 months ago
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- A shellcode injection tool showcasing various process injection techniques☆134Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- ☆105Updated 4 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 7 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆67Updated 9 months ago
- ☆58Updated 5 months ago
- 「💀」Proof of concept on BYOVD attack☆155Updated 3 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆66Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 5 months ago
- Continuous password spraying tool☆129Updated last week