Tw1sm / badger-builder
badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles
☆54Updated 5 months ago
Alternatives and similar repositories for badger-builder:
Users that are interested in badger-builder are comparing it to the libraries listed below
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- ☆17Updated 6 months ago
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- ☆50Updated 5 months ago
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated last year
- ☆44Updated 9 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated 10 months ago
- ☆34Updated 3 weeks ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- Reasonably undetected shellcode stager and executer.☆37Updated 7 months ago
- Lifetime AMSI bypass.☆34Updated this week
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated 3 weeks ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆44Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- ☆59Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 2 years ago
- ☆26Updated last year
- ☆56Updated last year
- Small project to facilitate creation of .lnk payloads☆66Updated 2 years ago