A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS
☆17Nov 5, 2025Updated 3 months ago
Alternatives and similar repositories for Covert-C2
Users that are interested in Covert-C2 are comparing it to the libraries listed below
Sorting:
- ☆12Feb 4, 2025Updated last year
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆48Nov 2, 2025Updated 4 months ago
- UDC2 implementation that provides an ICMP C2 channel☆115Nov 24, 2025Updated 3 months ago
- User-mode implementation of HTTP.SYS. Implements HTTP 1.1 of the "HTTP Server API 2.0" for web servers☆44Feb 17, 2025Updated last year
- A tool written in golang which compress using UPX and patch it with the provided PE file to make "UPX -d" flag impossible to decompress a…☆31Jan 2, 2025Updated last year
- ☆32Aug 21, 2023Updated 2 years ago
- Simulate per-process disconnection in red team environments☆113Jun 6, 2025Updated 8 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Signature finder (from PE-bear)☆40Aug 25, 2025Updated 6 months ago
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Feb 17, 2026Updated last week
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- Open-source multi-purpose remote access tool for Microsoft Windows☆195Updated this week
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Create a screenshot of a remote desktop because NLA is disabled.☆39Oct 30, 2021Updated 4 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 9 months ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- ☆22Aug 29, 2025Updated 6 months ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- ☆38Jan 13, 2023Updated 3 years ago
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- ☆46Oct 27, 2023Updated 2 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- A simple and efficient TPU (Transaction Processing Unit) client for Solana, utilizing the QUIC protocol for data transmission.☆21Dec 14, 2024Updated last year
- PathVis visualises traceroutes☆11Jan 25, 2024Updated 2 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 2 years ago
- python模拟登陆csdn☆11Jun 23, 2017Updated 8 years ago
- ☆11Jan 16, 2018Updated 8 years ago