Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)
☆167Dec 10, 2021Updated 4 years ago
Alternatives and similar repositories for QueenSono
Users that are interested in QueenSono are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 8 months ago
- A SigFlip implement in golang☆51Jan 5, 2022Updated 4 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆208Jul 2, 2024Updated last year
- Dirfuzz by golang☆15Feb 28, 2023Updated 3 years ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆162Sep 6, 2022Updated 3 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- The God Name Server☆37Mar 9, 2026Updated 2 weeks ago
- proxy your C2 traffic through CDN using websocket☆52Jul 24, 2022Updated 3 years ago
- GetProcAddressByHash/remap/full dll unhooking/Tartaru's Gate/Spoofing Gate/universal/Perun's Fart/Spoofing-Gate/EGG/RecycledGate/syswhisp…☆330Sep 10, 2024Updated last year
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆25Mar 19, 2026Updated last week
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- An easy way to getsystem by golang.☆55Aug 30, 2021Updated 4 years ago
- Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport☆1,694Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆501May 16, 2023Updated 2 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 3 months ago
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,560Aug 20, 2024Updated last year
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 11 months ago
- Small and convenient C2 tool for Windows targets☆614Mar 8, 2022Updated 4 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,374Oct 27, 2023Updated 2 years ago
- Killing your preferred antimalware by abusing native symbolic links and NT paths.☆359Jan 29, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆113Sep 15, 2022Updated 3 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆495Apr 1, 2021Updated 4 years ago
- ReflectiveDLL☆155Mar 16, 2020Updated 6 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆345Jan 22, 2025Updated last year
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,153Apr 17, 2025Updated 11 months ago
- Obfuscate go binaries. 混淆 go 二进制文件中的函数名☆50Aug 18, 2021Updated 4 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- the only php webshell you need.☆229Mar 18, 2025Updated last year
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Jun 10, 2022Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Ni-nuclei二开☆41Feb 24, 2024Updated 2 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago