carbonblack / mockc2Links
An interactive mock C2 server
☆16Updated 2 years ago
Alternatives and similar repositories for mockc2
Users that are interested in mockc2 are comparing it to the libraries listed below
Sorting:
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆19Updated 2 months ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- ☆38Updated 3 months ago
- Golang bindings for PE-sieve☆43Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆22Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- ☆12Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- CSharp4Pentesters☆12Updated 3 years ago
- ☆28Updated 4 years ago
- Python wrappers for mal_unpack☆36Updated last year
- Identifies metadata of .NET binary files.☆21Updated last year
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- Event Tracing for Windows EDR bypass in Rust (usermode)☆24Updated 11 months ago
- ☆30Updated 6 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago