darkr4y / geacon
Practice Go programming and implement CobaltStrike's Beacon in Go
☆1,145Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for geacon
- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls o…☆1,065Updated last year
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,618Updated 10 months ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,401Updated 2 months ago
- Load shellcode into a new process☆758Updated 3 years ago
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,394Updated last year
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,014Updated 4 months ago
- generate CobaltStrike's cross-platform payload☆2,276Updated 11 months ago
- Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.…☆764Updated 2 years ago
- A protective and Low Level Shellcode Loader that defeats modern EDR systems.☆887Updated 7 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆889Updated 4 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆1,489Updated 3 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆900Updated 3 years ago
- A modern multiple reverse shell sessions manager written in go☆1,515Updated last week
- The great impacket example scripts compiled for Windows☆916Updated 5 years ago
- link is a command and control framework written in rust☆561Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,338Updated 2 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,037Updated 7 months ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,615Updated 2 months ago
- Alternative Shellcode Execution Via Callbacks☆1,439Updated last year
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆1,507Updated 8 months ago
- Linux/Windows post-exploitation framework made by linux user☆1,322Updated 2 weeks ago
- Hunts out CobaltStrike beacons and logs operator command output☆884Updated 2 months ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆477Updated 3 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆727Updated 8 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,531Updated last year
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,483Updated last year
- Situational Awareness commands implemented using Beacon Object Files☆1,256Updated 2 months ago
- Cobalt Strike Aggressor 插件包☆672Updated 3 years ago
- c++ fully undetected shellcode launcher ;)☆966Updated 3 years ago
- Windows 权限提升 BadPotato☆803Updated 4 years ago