b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.
☆45Apr 21, 2025Updated 11 months ago
Alternatives and similar repositories for b3acon
Users that are interested in b3acon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆119Jan 25, 2026Updated 2 months ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 6 months ago
- Remote-shellcode loader in pure Rust☆25Jan 7, 2025Updated last year
- JSONPath-plus Remote Code Execution☆20Feb 26, 2025Updated last year
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 3 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Mar 25, 2025Updated last year
- Early Bird APC Injection in Rust☆64Oct 9, 2024Updated last year
- cve-2024-42327 ZBX-25623☆36Dec 1, 2024Updated last year
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated 2 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 3 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 3 months ago
- Persist like a Dodder☆68May 19, 2025Updated 10 months ago
- ☆19May 17, 2025Updated 10 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆53Sep 29, 2024Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- Enumerate active EDR's on the system☆152Sep 23, 2025Updated 6 months ago
- iOS 18.5 Beta 4(and below) MobileCoreService persistence exploit. Discovered by me!☆49May 4, 2025Updated 10 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- CVE-2024-53691☆13Jan 13, 2025Updated last year
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last month
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- ☆164May 5, 2025Updated 10 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago
- ☆18Feb 2, 2026Updated last month
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 7 months ago
- POC of GITHUB simple C2 in rust☆52Jul 27, 2025Updated 7 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 4 months ago
- C2 writen in Rust & Go powered by Tor network.☆153Oct 30, 2025Updated 4 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆342Mar 16, 2026Updated last week
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆256Jun 10, 2025Updated 9 months ago