demon-i386 / zoshrinkC2Links
DNS over HTTPS targeted malware (only runs once)
☆97Updated 2 years ago
Alternatives and similar repositories for zoshrinkC2
Users that are interested in zoshrinkC2 are comparing it to the libraries listed below
Sorting:
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆108Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 10 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated last month
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆132Updated 9 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- POC of GITHUB simple C2 in rust☆52Updated last month
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 8 months ago
- random code snippets, useful for getting started☆121Updated 9 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆96Updated 10 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- POC for DLL Proxying / Hijacking☆61Updated 3 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated 2 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆101Updated 4 months ago
- ☆84Updated 3 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Command and Control (C2) framework☆130Updated 3 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- offensive security scripts and documentation☆30Updated 2 months ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- ☆58Updated 9 months ago
- ☆108Updated 2 years ago