C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox Private Encrypted File Sharing
☆38Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for foxtrot
Users that are interested in foxtrot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Aug 10, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 6 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Feb 24, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- ☆110May 14, 2018Updated 7 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- ☆16May 6, 2015Updated 10 years ago
- ☆40Apr 26, 2012Updated 13 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21May 11, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- ObscurityLabs RedTeam C# Toolkit☆122Sep 3, 2019Updated 6 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆290Nov 23, 2017Updated 8 years ago
- Constrained Language Mode + AMSI bypass all in one☆156Jul 29, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆386Dec 13, 2020Updated 5 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Pypykatz server☆123Mar 15, 2019Updated 7 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago