Evasion kit for Cobalt Strike
☆30Jan 16, 2026Updated 2 months ago
Alternatives and similar repositories for Crystal-Kit
Users that are interested in Crystal-Kit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Crystal Palace shared library to resolve & perform syscalls☆59Oct 29, 2025Updated 5 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆281Mar 27, 2026Updated last week
- Source code for complete MALicious softWARE books I & II☆78Oct 10, 2025Updated 5 months ago
- sideloading PoC using onedrive.exe & version.dll☆93Oct 30, 2025Updated 5 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆68Jan 5, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- MDE/MDI Defender setup for Ludus☆55Mar 14, 2026Updated 3 weeks ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆138Apr 6, 2025Updated last year
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated 2 months ago
- ☆65Dec 19, 2024Updated last year
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆155Mar 4, 2026Updated last month
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆28Aug 19, 2024Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆136Aug 31, 2025Updated 7 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆202Dec 30, 2025Updated 3 months ago
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆71Mar 7, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆53Jun 28, 2025Updated 9 months ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago
- WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.☆78Feb 25, 2026Updated last month
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆208Nov 18, 2025Updated 4 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆189Jan 17, 2026Updated 2 months ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆113Jan 26, 2026Updated 2 months ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆613Feb 2, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆54Oct 13, 2025Updated 5 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Jan 27, 2026Updated 2 months ago
- Bloodhound alternative - simple ingestor. It generates low-level commands to exploit the AD easily and automatically: learn and control e…☆65Mar 28, 2026Updated last week
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆61Mar 27, 2026Updated last week
- An example of how to use Microsoft Windows Warbird technology☆95Apr 23, 2023Updated 2 years ago
- Beacon Debugger☆55Oct 28, 2024Updated last year
- ASPX Web Shell with COFF Loader☆126Mar 10, 2026Updated 3 weeks ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆72Dec 26, 2025Updated 3 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆24Mar 19, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆325Nov 20, 2025Updated 4 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆117Dec 21, 2025Updated 3 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆125Jan 29, 2026Updated 2 months ago
- A cmake template for crystal palace☆40Dec 20, 2025Updated 3 months ago