g0h4n / REC2
REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs written in Rust. π¦
β149Updated last year
Alternatives and similar repositories for REC2:
Users that are interested in REC2 are comparing it to the libraries listed below
- γπγProof of concept on BYOVD attackβ155Updated 3 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)β241Updated 8 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-buiβ¦β197Updated last month
- Evasive Golang Loaderβ129Updated 8 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's sectionβ147Updated last year
- A Rust implementation of Internal-Monologue β retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and β¦β159Updated 3 months ago
- TeamServer and Client of Exploration Command and Control Frameworkβ117Updated last week
- β170Updated 4 months ago
- A dirty PoC for a reverse shell with cool features in Rustβ182Updated 6 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ145Updated 10 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ74Updated 2 years ago
- β165Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.β232Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.β290Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ201Updated last year
- Port of Cobalt Strike's Process Inject Kitβ171Updated 3 months ago
- Adversary Emulation Frameworkβ92Updated 8 months ago
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β158Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.β216Updated last year
- AV bypass while you sip your Chai!β218Updated 10 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β192Updated 5 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β149Updated 2 weeks ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)β172Updated last month
- Terminate AV/EDR leveraging BYOVD attackβ82Updated last week
- yet another AV killer tool using BYOVDβ268Updated last year
- Lateral Movement Using DCOM and DLL Hijackingβ287Updated last year
- Lateral Movementβ123Updated last year
- β274Updated last year
- β162Updated 8 months ago