Google Calendar RAT is a PoC of Command&Control over Google Calendar Events
☆263Aug 19, 2025Updated 8 months ago
Alternatives and similar repositories for GCR-Google-Calendar-RAT
Users that are interested in GCR-Google-Calendar-RAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Jun 27, 2023Updated 2 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A C# Command & Control framework☆1,032Mar 28, 2024Updated 2 years ago
- ☆148Oct 29, 2024Updated last year
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 5 months ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆504May 16, 2023Updated 2 years ago
- Command & Control-Framework created for collaboration in python3☆326Aug 7, 2023Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆54Jul 15, 2023Updated 2 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Select any exported function in a dll as the new dll's entry point.☆82Oct 25, 2024Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- A C2 framework built for my bachelors thesis☆57Jan 14, 2026Updated 3 months ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆332Jul 15, 2024Updated last year
- ☆188Jun 14, 2025Updated 10 months ago
- HVNC for Cobalt Strike☆1,323Dec 7, 2023Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Jan 24, 2024Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- C2 redirector base on caddy☆213May 28, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Feb 13, 2024Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆642Mar 28, 2025Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- ☆336Sep 21, 2025Updated 7 months ago
- ☆224Mar 10, 2024Updated 2 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- Terminate AV/EDR Processes using kernel driver☆354Jun 12, 2023Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Dec 5, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory☆336Jun 22, 2024Updated last year
- Windows Defender Killer | Registry-Based Disablement + BYOVD Process Termination (C++)☆530Apr 2, 2026Updated last month
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated 3 months ago
- ☆111Feb 17, 2025Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆292May 27, 2024Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆375Apr 6, 2024Updated 2 years ago
- Command and Control (C2) framework☆133May 16, 2025Updated 11 months ago