ZeroMemoryEx / C2-Hunter
Extract C2 Traffic
☆242Updated 4 months ago
Related projects: ⓘ
- Kill AV/EDR leveraging BYOVD attack☆301Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆443Updated 7 months ago
- Terminate AV/EDR Processes using kernel driver☆306Updated last year
- Go shellcode loader that combines multiple evasion techniques☆337Updated last year
- ☆196Updated this week
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆539Updated 2 months ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆325Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆365Updated 3 months ago
- ☆309Updated this week
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆233Updated 4 months ago
- Escalate Service Account To LocalSystem via Kerberos☆387Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆459Updated 10 months ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆312Updated 2 months ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆367Updated last month
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆360Updated 2 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆511Updated 2 months ago
- Shellcode launcher for AV bypass☆215Updated 8 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆485Updated last month
- Awesome AV/EDR/XDR Bypass Tips☆244Updated last year
- This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)☆253Updated last month
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆355Updated 6 months ago
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆365Updated last year
- Amsi Bypass payload that works on Windwos 11☆369Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆316Updated last month
- UAC Bypass By Abusing Kerberos Tickets☆469Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆439Updated 3 months ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆452Updated 9 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆245Updated last year
- ☆222Updated this week
- HookChain: A new perspective for Bypassing EDR Solutions☆293Updated 3 weeks ago