gatariee / WintonView external linksLinks
Command and Control (C2) framework
☆132May 16, 2025Updated 8 months ago
Alternatives and similar repositories for Winton
Users that are interested in Winton are comparing it to the libraries listed below
Sorting:
- Monarch - The Adversary Emulation Toolkit☆63Jan 7, 2025Updated last year
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8☆351Aug 29, 2024Updated last year
- ☆46Jun 21, 2023Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Feb 6, 2026Updated last week
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆307Dec 9, 2023Updated 2 years ago
- Template-based generation of shellcode loaders☆80Apr 20, 2024Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Dec 20, 2023Updated 2 years ago
- Extracting NetNTLM without touching lsass.exe☆242Nov 27, 2023Updated 2 years ago
- An App Domain Manager Injection DLL PoC on steroids☆210Dec 14, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,012Jan 7, 2026Updated last month
- ☆259Jan 21, 2024Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆772Jan 26, 2026Updated 2 weeks ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆186Mar 4, 2024Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- Evasive Golang Loader☆137Jul 27, 2024Updated last year
- Remote Shellcode Injector☆221Aug 27, 2023Updated 2 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- ☆222Mar 10, 2024Updated last year
- Offensive Lua.☆221Feb 2, 2026Updated last week
- C# AV/EDR Killer using less-known driver (BYOVD)☆185Nov 10, 2023Updated 2 years ago
- Abuse leaked token handles.☆134Dec 14, 2023Updated 2 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆425Feb 11, 2024Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Feb 2, 2026Updated last week
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆440Oct 1, 2025Updated 4 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Nov 1, 2023Updated 2 years ago
- ☆164Sep 26, 2023Updated 2 years ago
- This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.☆122Feb 21, 2025Updated 11 months ago
- XOR decrypting shellcode using the GPU with OpenCL.☆120May 22, 2025Updated 8 months ago
- ☆100Oct 7, 2023Updated 2 years ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Jan 12, 2025Updated last year
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- This repository implements Threadless Injection in C☆172Dec 23, 2023Updated 2 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆229Jun 6, 2023Updated 2 years ago
- ☆65Mar 15, 2024Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆300Sep 7, 2023Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Jul 15, 2023Updated 2 years ago