c0sette / Cobalt4.4
Cobalt Strike 4.4 Full cracked
☆19Updated 2 years ago
Related projects: ⓘ
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆86Updated 11 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆60Updated 2 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆24Updated last year
- AMSI Bypass for powershell☆29Updated 2 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆42Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Scripts permettant de contourner la protection antivirale de Windows Defender via la technique de Direct Syscalls avec une injection de s…☆26Updated last year
- Conti Ransomware Source Code☆16Updated 2 years ago
- Abuse Xwizard.exe for DLL Side-Loading☆82Updated last year
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆48Updated 2 years ago
- CVE-2021-40444☆63Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆24Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 3 years ago
- Repository for archiving Cobalt Strike configuration☆28Updated this week
- abusing Process Hacker driver to terminate other processes (BYOVD)☆81Updated last year
- ☆96Updated this week
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆74Updated 10 months ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆81Updated 4 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆35Updated 4 months ago
- ☆117Updated this week
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆103Updated last year
- ☆105Updated this week
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated last year
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆51Updated 7 months ago
- Malicious DLL (Reverse Shell) generator for DLL Hijacking☆36Updated 4 years ago
- Akame is an open-source, UD shellcode loader written in C++17.☆19Updated 2 months ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆85Updated 2 years ago