A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM systems.
☆281Sep 14, 2022Updated 3 years ago
Alternatives and similar repositories for bantam
Users that are interested in bantam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆258May 12, 2020Updated 5 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆719Aug 17, 2021Updated 4 years ago
- Simple executable generator with encrypted shellcode.☆281Oct 3, 2022Updated 3 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆991Oct 7, 2022Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,452Dec 18, 2022Updated 3 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆317Dec 19, 2023Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆113Sep 15, 2022Updated 3 years ago
- ☆197Mar 19, 2020Updated 6 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Web shell generator and command line interface.☆85Oct 2, 2020Updated 5 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- A tool to kill antimalware protected processes☆1,506Jun 19, 2021Updated 4 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,153Apr 17, 2025Updated 11 months ago
- Pass the Hash to a named pipe for token Impersonation☆310Nov 29, 2023Updated 2 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Aug 5, 2022Updated 3 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆867Mar 20, 2023Updated 3 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆218Dec 8, 2022Updated 3 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Jul 14, 2021Updated 4 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆454Dec 23, 2020Updated 5 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆630May 28, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,168Sep 29, 2021Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,610Jul 10, 2023Updated 2 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆71Mar 27, 2023Updated 2 years ago
- Red Team oriented C# Simple HTTP & WebDAV Server with Net-NTLM hashes capture functionality☆287Jun 26, 2023Updated 2 years ago
- Open source C2 server created for stealth red team operations☆837Sep 26, 2022Updated 3 years ago
- Linux post exploitation privilege escalation enumeration☆257Aug 20, 2020Updated 5 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago