Evasion kit for Cobalt Strike
☆30Jan 16, 2026Updated 3 months ago
Alternatives and similar repositories for Crystal-Kit
Users that are interested in Crystal-Kit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Crystal Palace shared library to resolve & perform syscalls☆60Oct 29, 2025Updated 5 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆289Apr 8, 2026Updated 2 weeks ago
- Source code for complete MALicious softWARE books I & II☆78Oct 10, 2025Updated 6 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆69Jan 5, 2026Updated 3 months ago
- MDE/MDI Defender setup for Ludus☆55Mar 14, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆144Apr 6, 2025Updated last year
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆45Feb 6, 2026Updated 2 months ago
- ☆66Dec 19, 2024Updated last year
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆28Aug 19, 2024Updated last year
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆204Dec 30, 2025Updated 3 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆139Aug 31, 2025Updated 7 months ago
- ☆55Jun 28, 2025Updated 10 months ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆108Apr 16, 2026Updated last week
- WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.☆82Feb 25, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆76Mar 7, 2026Updated last month
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆210Nov 18, 2025Updated 5 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆191Jan 17, 2026Updated 3 months ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 3 months ago
- ☆55Oct 13, 2025Updated 6 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated 2 weeks ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆630Feb 2, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bloodhound alternative - simple ingestor. It generates low-level commands to exploit the AD easily and automatically: learn and control e…☆72Apr 18, 2026Updated last week
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆188Mar 4, 2026Updated last month
- An example of how to use Microsoft Windows Warbird technology☆94Apr 23, 2023Updated 3 years ago
- Beacon Debugger☆55Oct 28, 2024Updated last year
- ASPX Web Shell with COFF Loader☆129Mar 10, 2026Updated last month
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆74Dec 26, 2025Updated 4 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated last month
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆329Nov 20, 2025Updated 5 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆127Jan 29, 2026Updated 2 months ago
- A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.☆146Apr 15, 2026Updated last week
- A cmake template for crystal palace☆40Dec 20, 2025Updated 4 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆118Dec 21, 2025Updated 4 months ago
- ☆40Feb 27, 2026Updated 2 months ago