PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are relayed through Issues and Comments for maximum stealth.
☆45Jul 9, 2025Updated 8 months ago
Alternatives and similar repositories for HavocHub
Users that are interested in HavocHub are comparing it to the libraries listed below
Sorting:
- Thats it! An Open-Source Windows UEFI Rootkit☆29Jul 19, 2025Updated 8 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 2 months ago
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Silently Install Chrome Extension For Persistence☆100Jul 20, 2024Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆264Sep 23, 2025Updated 5 months ago
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆140Aug 31, 2025Updated 6 months ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Sep 29, 2022Updated 3 years ago
- A chrome extension that shows the time but steals the cookies in the back for demonstration purposes.☆23Mar 10, 2025Updated last year
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆154Nov 23, 2025Updated 3 months ago
- Loader Pre-Technology, Main thread hijacking without using API, get ntdll and kernel32 handle without peb. 加载器前置技术,不使用API进行主线程劫持,不使用PEB…☆91Jul 26, 2025Updated 7 months ago
- A dynamic HTTP/S stager that lets one shellcode loader be reused for different encrypted payloads - no rebuilds.☆20Oct 1, 2025Updated 5 months ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆326Updated this week
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Feb 8, 2023Updated 3 years ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆271Jun 18, 2025Updated 9 months ago
- ARL灯塔源码部署,二开基础环境、增强版、优化众多功能,新增钉钉——》知识库的自动化推送,优化扫描精度~☆44Updated this week
- Simulate per-process disconnection in red team environments☆112Jun 6, 2025Updated 9 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆200Apr 21, 2025Updated 11 months ago
- ☆59Feb 19, 2026Updated last month
- ☆26Dec 29, 2021Updated 4 years ago
- Rust编写的父进程PID欺骗技术测试工具☆53Jan 9, 2023Updated 3 years ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆66Feb 17, 2026Updated last month
- ☆18Jun 10, 2025Updated 9 months ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 3 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆199Jun 17, 2025Updated 9 months ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆85Nov 20, 2022Updated 3 years ago
- Bypass YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.☆53Oct 2, 2025Updated 5 months ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- ☆21Jun 9, 2023Updated 2 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 4 years ago
- ☆50Jun 4, 2025Updated 9 months ago
- Beacon compiled using clang☆71Jan 22, 2023Updated 3 years ago