efchatz / Covert-C2Links
A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS
☆16Updated last month
Alternatives and similar repositories for Covert-C2
Users that are interested in Covert-C2 are comparing it to the libraries listed below
Sorting:
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Updated 2 years ago
- Parses Cobalt Strike malleable C2 profiles.☆58Updated this week
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated 2 years ago
- UDC2 implementation that provides an ICMP C2 channel☆95Updated 3 weeks ago
- Tool to aid in dumping LSASS process remotely☆42Updated 2 months ago
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Updated 2 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Updated last year
- Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。)☆15Updated last year
- CVE-2024-40711-exp☆42Updated last year
- Tool to start processes as SYSTEM using token duplication☆38Updated 5 years ago
- Groovy Post Exploitation☆19Updated last year
- Winsocket for Cobalt Strike.☆101Updated 2 years ago
- Office 365 and Exchange Enumeration Version 2☆18Updated last year
- SAM Dumping in C#☆54Updated 2 weeks ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆51Updated 5 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Updated 9 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆66Updated last month
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆44Updated last year
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆87Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- ☆73Updated last year
- Using LNK files and user input simulation to start processes under explorer.exe☆30Updated last year
- ☆33Updated 3 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Updated 2 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Updated last year
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆65Updated last year
- PoC-Malware-TTPs☆49Updated 2 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆81Updated 3 years ago