SecTheBit / ZoomBotC2Links
☆56Updated 5 months ago
Alternatives and similar repositories for ZoomBotC2
Users that are interested in ZoomBotC2 are comparing it to the libraries listed below
Sorting:
- ☆52Updated 3 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆88Updated 9 months ago
- ☆54Updated 6 months ago
- ☆109Updated 10 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 8 months ago
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆95Updated 2 weeks ago
- BOF to decrypt Signal Desktop chat logs☆72Updated 10 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 5 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 4 months ago
- A BOF to enumerate system process, their protection levels, and more.☆123Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆100Updated 5 months ago
- Sniffing files generator☆59Updated 10 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆44Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 7 months ago
- ☆57Updated 10 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 8 months ago
- Threadless shellcode injection tool☆67Updated last year
- Utilizng an MCP Server to communicate with your C2☆86Updated 7 months ago
- ☆59Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆40Updated last month
- ☆46Updated 2 weeks ago
- A python script that automates a C2 Profile build☆48Updated last week
- Proof-of-concept implementation of AI-enabled postex DLLs☆53Updated 3 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 7 months ago
- ☆38Updated 8 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆83Updated 2 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆90Updated 4 months ago
- ☆99Updated last year