PhrozenIO / SharpFtpC2
A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.
☆85Updated 10 months ago
Related projects: ⓘ
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆102Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆74Updated last year
- ☆76Updated last year
- ☆92Updated last year
- C# havoc implant☆90Updated last year
- ☆50Updated 2 years ago
- ☆65Updated this week
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆55Updated 5 months ago
- ☆53Updated 5 months ago
- Winsocket for Cobalt Strike.☆96Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆60Updated last year
- Secretsdump C# version only supporting local (live) operation☆47Updated last year
- ☆87Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆85Updated 7 months ago
- ☆90Updated 6 months ago
- Tool to start processes as SYSTEM using token duplication☆37Updated 3 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆51Updated 7 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆147Updated 10 months ago
- Terminate AV/EDR leveraging BYOVD attack☆77Updated last year
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆114Updated last year
- Lateral Movement via the .NET Profiler☆74Updated 3 months ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆46Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆160Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆74Updated 10 months ago
- ☆60Updated this week
- ☆28Updated this week
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆50Updated last year
- Create Anti-Copy DRM Malware☆36Updated last month