TunnelGRE / PercinoLinks
Evasive Golang Loader
β137Updated last year
Alternatives and similar repositories for Percino
Users that are interested in Percino are comparing it to the libraries listed below
Sorting:
- γπγProof of concept on BYOVD attackβ165Updated last year
- Collection of random RedTeam scripts.β211Updated last year
- AV bypass while you sip your Chai!β226Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ136Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ149Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β184Updated 10 months ago
- β169Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β155Updated last year
- Havoc C2 profile generatorβ102Updated 6 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development courseβ207Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branchingβ154Updated 2 years ago
- My implementation of the GIUDA project in C++β188Updated 2 years ago
- C or BOF file to extract WebKit master key to decrypt user cookieβ207Updated last year
- Extracting NetNTLM without touching lsass.exeβ242Updated 2 years ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proceβ¦β153Updated 5 months ago
- Shaco is a linux agent for havocβ169Updated 2 years ago
- Terminate AV/EDR leveraging BYOVD attackβ104Updated 10 months ago
- Command and Control (C2) frameworkβ132Updated 8 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β213Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.β138Updated 3 years ago
- β186Updated 7 months ago
- Execute shellcode files with rundll32β214Updated 2 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructureβ145Updated 2 years ago
- β163Updated 2 years ago
- Weaponized HellsGate/SigFlipβ204Updated 2 years ago
- Lateral Movementβ125Updated 2 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434β259Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.β308Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.β241Updated 2 years ago