peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.
☆226Apr 14, 2025Updated 10 months ago
Alternatives and similar repositories for peeko
Users that are interested in peeko are comparing it to the libraries listed below
Sorting:
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,314Nov 12, 2025Updated 3 months ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,296Jun 17, 2025Updated 8 months ago
- Persist like a Dodder☆68May 19, 2025Updated 9 months ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Jul 11, 2025Updated 7 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- ☆568Mar 28, 2024Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆275May 2, 2025Updated 10 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆166Jul 30, 2025Updated 7 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- Shellcode loader that executes embedded Lua from Rust.☆128Dec 16, 2024Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆122May 29, 2024Updated last year
- ☆85May 15, 2025Updated 9 months ago
- Nameless C2 - A C2 with all its components written in Rust☆283Sep 26, 2024Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆308Mar 31, 2025Updated 11 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆391Sep 26, 2025Updated 5 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 3 months ago
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 10 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Mar 25, 2025Updated 11 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated 2 weeks ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆334Mar 6, 2025Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆502Jan 23, 2026Updated last month
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆221Nov 3, 2025Updated 4 months ago
- ☆160May 5, 2025Updated 10 months ago
- Stealthily inject shellcode into an executable☆452Oct 19, 2025Updated 4 months ago
- BOF with Synthetic Stackframe☆230Oct 30, 2025Updated 4 months ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆334Jan 14, 2026Updated last month
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆637May 8, 2025Updated 9 months ago
- ☆159Dec 13, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 11 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago