SaadAhla / GithubC2
Github as C2 Demonstration , free API = free C2 Infrastructure
☆128Updated last year
Related projects: ⓘ
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆139Updated 4 months ago
- Patching AmsiOpenSession by forcing an error branching☆141Updated last year
- Execute shellcode files with rundll32☆171Updated 7 months ago
- Attempt at Obfuscated version of SharpCollection☆188Updated this week
- ☆138Updated this week
- Run Your Payload Without Running Your Payload☆174Updated last year
- 「💀」Proof of concept on BYOVD attack☆147Updated 6 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆219Updated last year
- ☆159Updated last year
- Weaponized HellsGate/SigFlip☆188Updated last year
- Evasive Golang Loader☆129Updated last month
- ☆155Updated 10 months ago
- Patch AMSI and ETW☆227Updated 4 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆157Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆114Updated 2 months ago
- AV bypass while you sip your Chai!☆205Updated 4 months ago
- The Official Sliver Armory☆80Updated last month
- Shaco is a linux agent for havoc☆137Updated 10 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆59Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆144Updated 4 months ago
- ☆172Updated 9 months ago
- ☆161Updated this week
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated 8 months ago
- Extracting NetNTLM without touching lsass.exe☆223Updated 9 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 9 months ago
- My implementation of the GIUDA project in C++☆152Updated last year
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆291Updated last year
- ☆103Updated 5 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆242Updated last month
- Lateral Movement Using DCOM and DLL Hijacking☆262Updated last year