b3rito / smuggloView external linksLinks
smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters
☆131Mar 25, 2025Updated 10 months ago
Alternatives and similar repositories for smugglo
Users that are interested in smugglo are comparing it to the libraries listed below
Sorting:
- ☆39Mar 28, 2025Updated 10 months ago
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆222Apr 14, 2025Updated 10 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆99Jul 9, 2025Updated 7 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 7 months ago
- ☆50Apr 9, 2025Updated 10 months ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆74Aug 19, 2025Updated 5 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Apr 18, 2025Updated 9 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 10 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 2 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A PoC for Early Cascade process injection technique.☆208Jan 30, 2025Updated last year
- ☆167Feb 29, 2024Updated last year
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 9 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 7 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆466Nov 2, 2024Updated last year
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 2 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆135Apr 18, 2025Updated 9 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Mar 6, 2025Updated 11 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆216Nov 3, 2025Updated 3 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Jul 30, 2025Updated 6 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 6 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆36Jan 27, 2026Updated 2 weeks ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- ☆186Jun 14, 2025Updated 8 months ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 10 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆376Jan 23, 2025Updated last year