g0h4n / REC2Links
REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs written in Rust. π¦
β157Updated last year
Alternatives and similar repositories for REC2
Users that are interested in REC2 are comparing it to the libraries listed below
Sorting:
- β164Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)β246Updated last year
- Evasive Golang Loaderβ132Updated 11 months ago
- γπγProof of concept on BYOVD attackβ161Updated 7 months ago
- A dirty PoC for a reverse shell with cool features in Rustβ182Updated 10 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β153Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ147Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructureβ140Updated last year
- yet another AV killer tool using BYOVDβ292Updated last year
- Execute shellcode files with rundll32β205Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ137Updated last year
- Nameless C2 - A C2 with all its components written in Rustβ268Updated 9 months ago
- TeamServer and Client of Exploration Command and Control Frameworkβ138Updated last month
- AV bypass while you sip your Chai!β222Updated last year
- Shaco is a linux agent for havocβ165Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.β160Updated 2 years ago
- Automated .NET AppDomain hijack payload generationβ126Updated 5 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β168Updated 4 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUSTβ188Updated 10 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-buiβ¦β222Updated 5 months ago
- Command and Control (C2) frameworkβ127Updated 2 months ago
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download optionsβ140Updated 3 months ago
- random code snippets, useful for getting startedβ121Updated 8 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β203Updated 8 months ago
- Terminate AV/EDR leveraging BYOVD attackβ88Updated 3 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proceβ¦β132Updated 8 months ago
- C or BOF file to extract WebKit master key to decrypt user cookieβ202Updated last year
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.β278Updated 4 months ago