π§ββοΈ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
β1,320Mar 27, 2026Updated last month
Alternatives and similar repositories for Loki
Users that are interested in Loki are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike BOF for evasive .NET assembly executionβ317Mar 31, 2025Updated last year
- Weaponizing DCOM for NTLM Authentication Coercionsβ275Jul 1, 2025Updated 10 months ago
- A BOF that runs unmanaged PEs inlineβ695Oct 23, 2024Updated last year
- Reaping treasures from strings in remote processes memoryβ286Feb 8, 2025Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the β¦β1,859Nov 3, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dllβ154Apr 18, 2025Updated last year
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)β705May 7, 2025Updated 11 months ago
- AdaptixC2 is a highly modular advanced redteam toolkitβ3,066Mar 22, 2026Updated last month
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inteβ¦β1,367Nov 12, 2025Updated 5 months ago
- Remote operations commands implemented using Beacon Object Filesβ1,154Mar 5, 2026Updated last month
- Nameless C2 - A C2 with all its components written in Rustβ285Sep 26, 2024Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph APIβ630Jun 25, 2024Updated last year
- Robust Cobalt Strike shellcode loader with multiple advanced evasion featuresβ204Apr 21, 2025Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFsβ623Feb 21, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Windows remote execution multitoolβ794Mar 25, 2026Updated last month
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotelyβ384Dec 13, 2024Updated last year
- Situational Awareness commands implemented using Beacon Object Filesβ1,783Mar 10, 2026Updated last month
- Collection of Beacon Object Files (BOF) for Cobalt Strikeβ687Aug 15, 2025Updated 8 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.β449Dec 21, 2023Updated 2 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!β1,413Nov 22, 2023Updated 2 years ago
- COM ViewLogger β new malware keylogging techniqueβ407Jan 6, 2025Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird β¦β794Jan 26, 2026Updated 3 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!β552May 9, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Dump cookies and credentials directly from Chrome/Edge process memoryβ1,445Apr 9, 2026Updated 3 weeks ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniβ¦β1,384Oct 27, 2023Updated 2 years ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.β513Mar 7, 2026Updated last month
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.β349Mar 21, 2026Updated last month
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.β625Jan 2, 2025Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)β197Feb 6, 2025Updated last year
- ForsHopsβ154Mar 25, 2025Updated last year
- An example reference design for a proposed BOF PEβ206Jan 23, 2026Updated 3 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijackingβ440Jun 27, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cobalt Strike UDRL for memory scanner evasion.β1,014Jun 4, 2024Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.β1,198Oct 16, 2023Updated 2 years ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and β¦β335Mar 6, 2025Updated last year
- A modern 32/64-bit position independent implant templateβ1,320Mar 21, 2025Updated last year
- early cascade injection PoC based on Outflanks blog postβ241Nov 7, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactionsβ350Nov 19, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.β285Apr 6, 2025Updated last year