Ne0nd0g / merlin-agent-dll
β52Updated 5 months ago
Alternatives and similar repositories for merlin-agent-dll:
Users that are interested in merlin-agent-dll are comparing it to the libraries listed below
- Simple HTTP async comms using standard GET/POST requestsβ30Updated 2 months ago
- ππͺ² Malleable C2 profiles parser and assembler written in golangβ61Updated 8 months ago
- AutoStart teamserver and listeners with servicesβ71Updated 3 years ago
- A third-party Gopher Assassin for the Havoc Framework.β45Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog β¦β79Updated last year
- β94Updated last year
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()β34Updated 3 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerabilityβ35Updated 2 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows APIβ83Updated last year
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.β147Updated 2 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell proβ¦β85Updated last year
- Winsocket for Cobalt Strike.β99Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFSβ174Updated 2 years ago
- C# Port of LdapRelayScanβ78Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally β¦β83Updated 2 years ago
- β51Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.β89Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.β79Updated last year
- Bypass Detection By Randomising ROR13 API Hashesβ134Updated 2 years ago
- β89Updated 2 years ago
- To audit the security of read-only domain controllersβ114Updated last year
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDRβ98Updated 3 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.β109Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.β125Updated last year
- Secretsdump C# version only supporting local (live) operationβ48Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.β71Updated last year
- A BOF port of the research of @thefLinkk and @codewhitesecβ96Updated 3 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.β¦β121Updated 3 years ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another processβ29Updated 2 years ago
- POC tools for exploring SMB over QUIC protocolβ122Updated 2 years ago