Nero22k / teamsc2View external linksLinks
Brute Ratel External C2 (Microsoft Teams)
☆38Dec 11, 2024Updated last year
Alternatives and similar repositories for teamsc2
Users that are interested in teamsc2 are comparing it to the libraries listed below
Sorting:
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 8 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 6 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- ☆15May 30, 2025Updated 8 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆18Jun 20, 2025Updated 7 months ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated last year
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Living off the land searches for explorer and sharepoint☆92Dec 7, 2025Updated 2 months ago
- ☆33Mar 19, 2025Updated 10 months ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 2 years ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 6 months ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- ☆37Jan 7, 2025Updated last year
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆41Dec 30, 2025Updated last month
- malware written for educational purposes☆71Dec 31, 2025Updated last month
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 8 months ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- RPC to WebClient startup☆55Aug 19, 2025Updated 5 months ago
- BOF to decrypt Signal Desktop chat logs☆72Feb 20, 2025Updated 11 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Apr 27, 2023Updated 2 years ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- COM-based DLL Surrogate Injection☆140Dec 9, 2025Updated 2 months ago
- A small How-To on creating your own weaponized WSL file☆119Jul 23, 2025Updated 6 months ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 5 months ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆37Nov 22, 2025Updated 2 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Dec 16, 2025Updated last month
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- tsh多终端代理通信☆19Feb 26, 2025Updated 11 months ago
- ☆241May 5, 2024Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆167May 30, 2024Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆22Aug 26, 2023Updated 2 years ago
- ☆145Nov 6, 2025Updated 3 months ago
- SCEP request tool for AD CS and Intune☆73Oct 24, 2025Updated 3 months ago
- Enumerate Domain Users Without Authentication☆281Apr 22, 2025Updated 9 months ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago