Abusing SSRF to deliver an authenticated command injection payload
☆29Sep 1, 2025Updated 6 months ago
Alternatives and similar repositories for Havoc-C2-RCE-2024
Users that are interested in Havoc-C2-RCE-2024 are comparing it to the libraries listed below
Sorting:
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62May 16, 2025Updated 9 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 8 months ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 2 months ago
- NSecSoftBYOVD POC☆57Feb 12, 2026Updated 3 weeks ago
- 读取微信联系人列表,版本(3.9.12.51)☆13Mar 22, 2025Updated 11 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 3 months ago
- ☆41Feb 20, 2025Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆45Updated this week
- Python tool to automatically perform SPN-less RBCD attacks.☆123Jan 7, 2026Updated last month
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- A set of tools and resources for analysis of Havoc C2☆26Feb 27, 2024Updated 2 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 2 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Feb 3, 2026Updated last month
- ☆20Nov 8, 2020Updated 5 years ago
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- ☆36Jul 1, 2025Updated 8 months ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆33Jul 5, 2025Updated 8 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆162Jun 19, 2025Updated 8 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 11 months ago
- ☆18Feb 15, 2020Updated 6 years ago
- ☆55May 31, 2025Updated 9 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆64Jan 21, 2025Updated last year
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- ☆26Aug 5, 2025Updated 7 months ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- CVE-2025-33053 Proof Of Concept (PoC)☆63Jun 17, 2025Updated 8 months ago
- ☆59Oct 24, 2024Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Feb 24, 2026Updated last week
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- ☆54Feb 12, 2026Updated 3 weeks ago
- powershell script to simulate activity by a user☆22Jul 29, 2020Updated 5 years ago
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆152Mar 26, 2025Updated 11 months ago
- ☆55Nov 18, 2025Updated 3 months ago
- CVE-2024-35250 的 Beacon Object File (BOF) 实现。☆24Nov 28, 2024Updated last year