WKL-Sec / slack-udc2Links
Cobalt Strike UDC2 implementation that provides an Slack C2 channel
☆60Updated last month
Alternatives and similar repositories for slack-udc2
Users that are interested in slack-udc2 are comparing it to the libraries listed below
Sorting:
- ☆55Updated 8 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 9 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Updated 3 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 6 months ago
- Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData!☆66Updated last week
- ☆35Updated last year
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆81Updated 2 weeks ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆107Updated 5 months ago
- RPC to WebClient startup☆54Updated 5 months ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆42Updated 10 months ago
- ForsHops☆59Updated 10 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Updated last year
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆88Updated last month
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Updated 2 weeks ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 5 months ago
- converts sRDI compatible dlls to shellcode☆35Updated last year
- Impersonate Tokens using only NTAPI functions☆83Updated 10 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated last year
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Updated last month
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- Post-Ex BOF tooling for Hannibal☆24Updated last year
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆61Updated last month
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆73Updated 3 months ago
- A cmake template for crystal palace☆38Updated last month
- Local SYSTEM auth trigger for relaying - X☆155Updated 6 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆79Updated 2 years ago
- Commandline spoofing on Windows☆93Updated 2 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆122Updated 3 weeks ago