TunnelGRE / PercinoLinks
Evasive Golang Loader
β135Updated last year
Alternatives and similar repositories for Percino
Users that are interested in Percino are comparing it to the libraries listed below
Sorting:
- γπγProof of concept on BYOVD attackβ163Updated 9 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ148Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β173Updated 6 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β153Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- My implementation of the GIUDA project in C++β186Updated 2 years ago
- Chrome browser extension-based Command & Controlβ174Updated 3 months ago
- AV bypass while you sip your Chai!β224Updated last year
- Collection of random RedTeam scripts.β208Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookieβ205Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teamsβ131Updated last year
- Stage 0β164Updated 9 months ago
- Havoc C2 profile generatorβ96Updated 2 months ago
- A shellcode injection tool showcasing various process injection techniquesβ136Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β208Updated 11 months ago
- Execute shellcode files with rundll32β209Updated last year
- Extracting NetNTLM without touching lsass.exeβ239Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proceβ¦β141Updated 2 months ago
- β170Updated last year
- Command and Control (C2) frameworkβ131Updated 4 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructureβ141Updated 2 years ago
- β164Updated last year
- Shaco is a linux agent for havocβ166Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"β119Updated last year
- Automated .NET AppDomain hijack payload generationβ127Updated 8 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dumpβ149Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.β309Updated last year
- Weaponized HellsGate/SigFlipβ203Updated 2 years ago
- Lateral Movementβ124Updated last year
- Port of Cobalt Strike's Process Inject Kitβ185Updated 10 months ago