g0h4n / REC2
REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs written in Rust. π¦
β152Updated last year
Alternatives and similar repositories for REC2:
Users that are interested in REC2 are comparing it to the libraries listed below
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-buiβ¦β206Updated 2 months ago
- A Rust implementation of Internal-Monologue β retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and β¦β161Updated 4 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)β242Updated 9 months ago
- TeamServer and Client of Exploration Command and Control Frameworkβ123Updated 2 weeks ago
- Port of Cobalt Strike's Process Inject Kitβ172Updated 4 months ago
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β156Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β197Updated 6 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)β173Updated 2 months ago
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- A dirty PoC for a reverse shell with cool features in Rustβ182Updated 7 months ago
- β170Updated 5 months ago
- Shaco is a linux agent for havocβ160Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ145Updated 11 months ago
- γπγProof of concept on BYOVD attackβ157Updated 4 months ago
- Automated .NET AppDomain hijack payload generationβ123Updated 2 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.β177Updated last year
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download optionsβ136Updated 3 weeks ago
- Lateral Movement Using DCOM and DLL Hijackingβ289Updated last year
- yet another AV killer tool using BYOVDβ270Updated last year
- The Official Sliver Armoryβ102Updated this week
- β164Updated 8 months ago
- Terminate AV/EDR leveraging BYOVD attackβ83Updated 3 weeks ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development courseβ186Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's sectionβ148Updated last year
- My implementation of the GIUDA project in C++β180Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β151Updated 11 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β154Updated last month
- β276Updated last year
- Adversary Emulation Frameworkβ98Updated 8 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ204Updated last year