g0h4n / REC2Links
REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs written in Rust. π¦
β154Updated last year
Alternatives and similar repositories for REC2
Users that are interested in REC2 are comparing it to the libraries listed below
Sorting:
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-buiβ¦β212Updated 3 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)β242Updated 11 months ago
- β164Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β165Updated 2 months ago
- A Rust implementation of Internal-Monologue β retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and β¦β162Updated last month
- TeamServer and Client of Exploration Command and Control Frameworkβ128Updated last week
- γπγProof of concept on BYOVD attackβ159Updated 5 months ago
- Havoc C2 profile generatorβ89Updated 7 months ago
- Port of Cobalt Strike's Process Inject Kitβ178Updated 6 months ago
- Evasive Golang Loaderβ131Updated 10 months ago
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year
- Rust in-memory dumperβ108Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructureβ140Updated last year
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCSβ147Updated 3 months ago
- Lateral Movement Using DCOM and DLL Hijackingβ291Updated last year
- AV bypass while you sip your Chai!β222Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β152Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)β182Updated 3 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β200Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ147Updated last year
- Shellcode loader designed for evasion. Coded in Rust.β128Updated 2 years ago
- Execute shellcode files with rundll32β198Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's sectionβ148Updated last year
- β277Updated last year
- Ghosting-AMSIβ180Updated last month
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β96Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to executionβ187Updated 6 months ago
- Shaco is a linux agent for havocβ161Updated last year
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download optionsβ139Updated 2 months ago