b3rito / peekoView external linksLinks
peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.
☆222Apr 14, 2025Updated 9 months ago
Alternatives and similar repositories for peeko
Users that are interested in peeko are comparing it to the libraries listed below
Sorting:
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆208Dec 25, 2024Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,301Nov 12, 2025Updated 3 months ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,290Jun 17, 2025Updated 7 months ago
- Persist like a Dodder☆67May 19, 2025Updated 8 months ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Jul 11, 2025Updated 7 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆264May 2, 2025Updated 9 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- ☆567Mar 28, 2024Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Jul 30, 2025Updated 6 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆231Feb 12, 2025Updated last year
- Shellcode loader that executes embedded Lua from Rust.☆127Dec 16, 2024Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- ☆85May 15, 2025Updated 8 months ago
- Nameless C2 - A C2 with all its components written in Rust☆282Sep 26, 2024Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆307Mar 31, 2025Updated 10 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆287Apr 29, 2025Updated 9 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆384Sep 26, 2025Updated 4 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 2 months ago
- Enumerate Domain Users Without Authentication☆281Apr 22, 2025Updated 9 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Mar 25, 2025Updated 10 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆332Mar 6, 2025Updated 11 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆501Jan 23, 2026Updated 3 weeks ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ForsHops☆152Mar 25, 2025Updated 10 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆216Nov 3, 2025Updated 3 months ago
- Stealthily inject shellcode into an executable☆445Oct 19, 2025Updated 3 months ago
- BOF with Synthetic Stackframe☆220Oct 30, 2025Updated 3 months ago
- ☆159May 5, 2025Updated 9 months ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆328Jan 14, 2026Updated 3 weeks ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆635May 8, 2025Updated 9 months ago
- ☆159Dec 13, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago