demon-i386 / zoshrinkC2View external linksLinks
DNS over HTTPS targeted malware (only runs once)
☆96Aug 16, 2023Updated 2 years ago
Alternatives and similar repositories for zoshrinkC2
Users that are interested in zoshrinkC2 are comparing it to the libraries listed below
Sorting:
- EternalHush - java-based open-source c2 framework that targets Microsoft Windows☆27Feb 10, 2026Updated last week
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- ☆39May 20, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆91Dec 2, 2025Updated 2 months ago
- Perform DCSync operation without mimikatz☆153Nov 5, 2024Updated last year
- A C2 framework built for my bachelors thesis☆57Jan 14, 2026Updated last month
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated last year
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆258Jun 29, 2024Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆402Sep 14, 2023Updated 2 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- grim reaper c2☆346Nov 19, 2022Updated 3 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆202Jun 25, 2024Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Jul 7, 2023Updated 2 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆228Jun 6, 2023Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Jun 30, 2021Updated 4 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆476Sep 19, 2023Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Oct 28, 2023Updated 2 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- Go shellcode loader that combines multiple evasion techniques☆387Jun 21, 2023Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Jun 27, 2023Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 10 months ago
- ☆15May 6, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- Nim Library for Offensive Security Development☆197Sep 4, 2023Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆721Aug 18, 2023Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆154Jun 28, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Mar 15, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago