demon-i386 / zoshrinkC2
DNS over HTTPS targeted malware (only runs once)
☆95Updated last year
Related projects ⓘ
Alternatives and complementary repositories for zoshrinkC2
- random code snippets, useful for getting started☆112Updated last week
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆92Updated last year
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆106Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 6 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆62Updated 2 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 3 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Make an Linux Kernel rootkit visible again.☆45Updated 2 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆60Updated 8 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆61Updated last month
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Updated 3 months ago
- ☆82Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- A C2 framework built for my bachelors thesis☆53Updated 3 weeks ago
- ☆43Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆51Updated 4 months ago
- ☆53Updated last month
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 11 months ago
- Automated .NET AppDomain hijack payload generation☆113Updated 4 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆25Updated last month
- quick and dirty proof-of-concept to hide shells in images☆49Updated 4 months ago
- ☆105Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆52Updated 10 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆124Updated 2 weeks ago
- ☆26Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Updated last year