Agent for AdaptixC2 with focus in evasion, capability and malleable.
☆176Mar 22, 2026Updated last week
Alternatives and similar repositories for Kharon
Users that are interested in Kharon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Templates for developing your own listeners and agents for AdaptixC2.☆50Feb 28, 2026Updated last month
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆111Jan 21, 2026Updated 2 months ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆48Nov 9, 2025Updated 4 months ago
- RunPE implementation with multiple evasive techniques (2)☆278Sep 25, 2025Updated 6 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆55May 31, 2025Updated 9 months ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Mar 23, 2026Updated last week
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 5 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 4 months ago
- A Mythic Agent written in PIC C.☆205Feb 4, 2025Updated last year
- ☆108Aug 21, 2024Updated last year
- Stealthily inject shellcode into an executable☆456Oct 19, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆53Sep 23, 2025Updated 6 months ago
- dcsync bof☆46Feb 13, 2026Updated last month
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated 2 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆93Jan 2, 2026Updated 2 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆281Updated this week
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆203Apr 21, 2025Updated 11 months ago
- Code execution/injection technique using DLL PEB module structure manipulation☆225Jun 4, 2025Updated 9 months ago
- A BOF that runs unmanaged PEs inline☆687Oct 23, 2024Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆125Jul 11, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆117Dec 21, 2025Updated 3 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆289Jan 12, 2026Updated 2 months ago
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆195Feb 11, 2026Updated last month
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆200Jun 17, 2025Updated 9 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆43Aug 6, 2025Updated 7 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 9 months ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆214Oct 9, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- COM-based DLL Surrogate Injection☆151Dec 9, 2025Updated 3 months ago
- This is the tool to dump the LSASS process on modern Windows 11☆565Nov 1, 2025Updated 4 months ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆332Updated this week
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆66Jan 5, 2026Updated 2 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆508Mar 7, 2026Updated 3 weeks ago
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆230Sep 19, 2025Updated 6 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago