g0h4n / REC2
REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs written in Rust. π¦
β153Updated last year
Alternatives and similar repositories for REC2:
Users that are interested in REC2 are comparing it to the libraries listed below
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)β243Updated 10 months ago
- A Rust implementation of Internal-Monologue β retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and β¦β162Updated 2 weeks ago
- β164Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-buiβ¦β210Updated 2 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β158Updated last month
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β151Updated last year
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download optionsβ136Updated last month
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRsβ79Updated 2 years ago
- Adversary Emulation Frameworkβ98Updated 9 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ148Updated last year
- β172Updated 6 months ago
- β276Updated last year
- Windows Persistence IT-Securityβ98Updated 2 months ago
- A dirty PoC for a reverse shell with cool features in Rustβ182Updated 8 months ago
- TeamServer and Client of Exploration Command and Control Frameworkβ125Updated last week
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.β301Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)β179Updated 3 months ago
- γπγProof of concept on BYOVD attackβ158Updated 5 months ago
- AV bypass while you sip your Chai!β220Updated 11 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructureβ137Updated last year
- β154Updated 9 months ago
- Malicious powershell scripts loader designed to avoid detection.β51Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β199Updated 6 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.β228Updated 4 months ago
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Solβ¦β93Updated last month
- Port of Cobalt Strike's Process Inject Kitβ175Updated 5 months ago
- A C# port from Invoke-GhostTaskβ114Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ53Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reductiβ¦β198Updated 11 months ago