fern89 / C2Links
A basic C2 framework written in C
☆60Updated last year
Alternatives and similar repositories for C2
Users that are interested in C2 are comparing it to the libraries listed below
Sorting:
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆97Updated last month
- TypeLib persistence technique☆120Updated 10 months ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆121Updated 2 years ago
- ☆57Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- ☆48Updated 3 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆128Updated 6 months ago
- Beacon Object File (BOF) Template☆55Updated 9 months ago
- ☆81Updated last year
- ApexLdr is a DLL Payload Loader written in C☆112Updated last year
- PrimitiveInjection by using Read, Write and Allocation Primitives.☆48Updated 2 months ago
- A nice process dumping tool☆82Updated 3 years ago
- ☆142Updated 2 years ago
- bring your own vulnerable driver☆106Updated 2 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆74Updated 2 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆60Updated 2 months ago
- ☆50Updated 3 years ago
- find dll base addresses without PEB WALK☆141Updated last month
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆58Updated 2 years ago
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆148Updated 3 weeks ago
- ☆124Updated 11 months ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆106Updated last year
- Evasive loader to bypass static detection☆58Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆64Updated 2 years ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆128Updated 4 months ago
- ☆122Updated 2 years ago
- Windows C++ Implant for Exploration C2☆38Updated 2 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆58Updated 5 months ago
- ☆56Updated 2 years ago
- An Obfuscator-LLVM based mingw-w64 toolchain.☆41Updated 3 years ago