g0h4n / REC2Links
REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs written in Rust. π¦
β161Updated last year
Alternatives and similar repositories for REC2
Users that are interested in REC2 are comparing it to the libraries listed below
Sorting:
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)β259Updated last year
- γπγProof of concept on BYOVD attackβ165Updated last year
- β163Updated 2 years ago
- A dirty PoC for a reverse shell with cool features in Rustβ187Updated last month
- Shaco is a linux agent for havocβ170Updated 2 years ago
- yet another AV killer tool using BYOVDβ300Updated 2 years ago
- Documents Exfiltration project for fun and educational purposesβ144Updated 2 years ago
- A shellcode injection tool showcasing various process injection techniquesβ136Updated 2 years ago
- AV bypass while you sip your Chai!β227Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β155Updated last year
- β169Updated last year
- Evasive Golang Loaderβ137Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ149Updated last year
- Automated .NET AppDomain hijack payload generationβ129Updated 11 months ago
- Execute shellcode files with rundll32β213Updated last year
- random code snippets, useful for getting startedβ123Updated last month
- Collection of random RedTeam scripts.β211Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructureβ145Updated 2 years ago
- Nameless C2 - A C2 with all its components written in Rustβ283Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-buiβ¦β230Updated 10 months ago
- β122Updated 9 months ago
- Weaponized HellsGate/SigFlipβ205Updated 2 years ago
- Port of Cobalt Strike's Process Inject Kitβ190Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.β202Updated 2 years ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUSTβ195Updated last year
- Windows Persistence IT-Securityβ108Updated 10 months ago
- TeamServer and Client of Exploration Command and Control Frameworkβ174Updated 2 months ago
- An interactive shell to spoof some LOLBins command lineβ187Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β122Updated 6 months ago
- Lateral Movement Using DCOM and DLL Hijackingβ325Updated 2 years ago