β36Jul 1, 2025Updated 8 months ago
Alternatives and similar repositories for nightshade
Users that are interested in nightshade are comparing it to the libraries listed below
Sorting:
- π [ New Chrome Cookies ] AVM-Tools - Advanced FUD Stealer. Features: Credential Extraction (Passwords, Cookies, Autofill), Discord Sessiβ¦β27Mar 1, 2026Updated last week
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injectionβ71Dec 26, 2025Updated 2 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.β19Jun 20, 2025Updated 8 months ago
- β23Dec 31, 2025Updated 2 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channelβ63Jan 5, 2026Updated 2 months ago
- β26Aug 11, 2025Updated 6 months ago
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.β134Nov 12, 2025Updated 3 months ago
- A BOF that's a BOF Loader and moreβ199Jan 17, 2026Updated last month
- β39Nov 25, 2025Updated 3 months ago
- The code I write in my blogβ83Feb 21, 2026Updated 2 weeks ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal β¦β89Jan 2, 2026Updated 2 months ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c toolsβ54Updated this week
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and β¦β111Feb 15, 2026Updated 3 weeks ago
- A C# PE loader for x64 and x86 PE files.β47Feb 24, 2026Updated last week
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasionβ28Jul 21, 2025Updated 7 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.β46Aug 13, 2025Updated 6 months ago
- β53Sep 23, 2025Updated 5 months ago
- β37Feb 3, 2026Updated last month
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287β46Oct 28, 2025Updated 4 months ago
- A stager and implant that executes remote Web Assemblyβ37Feb 4, 2026Updated last month
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux serversβ18Mar 19, 2025Updated 11 months ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.β27Jul 4, 2025Updated 8 months ago
- POC of GITHUB simple C2 in rustβ52Jul 27, 2025Updated 7 months ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard historβ¦β103Jan 9, 2026Updated last month
- Enumerate active EDR's on the systemβ152Sep 23, 2025Updated 5 months ago
- β48Dec 5, 2025Updated 3 months ago
- single-threaded event driven sleep obfuscation poc for linuxβ38Jun 14, 2025Updated 8 months ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).β68Dec 17, 2025Updated 2 months ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.β132Sep 4, 2025Updated 6 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThreadβ31Jan 9, 2022Updated 4 years ago
- β50Jun 4, 2025Updated 9 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libraβ¦β80Nov 6, 2025Updated 4 months ago
- C2 for studyingβ26Aug 10, 2025Updated 6 months ago
- miscellaneous codesβ36Sep 24, 2023Updated 2 years ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.β20Jul 8, 2022Updated 3 years ago
- Sh3ller is a lightweight C2 framework in its simplest form.β31Sep 5, 2025Updated 6 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.β460Feb 25, 2026Updated last week
- A small How-To on creating your own weaponized WSL fileβ122Jul 23, 2025Updated 7 months ago
- AppLocker-Based EDR Neutralizationβ323Dec 19, 2025Updated 2 months ago