githubesson / paradoxLinks
macos stealer poc
☆122Updated last month
Alternatives and similar repositories for paradox
Users that are interested in paradox are comparing it to the libraries listed below
Sorting:
- C2 writen in Rust & Go powered by Tor network.☆131Updated 2 weeks ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆196Updated last month
- Decrypt GlobalProtect configuration and cookie files.☆150Updated 11 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated this week
- An interactive shell to spoof some LOLBins command line☆185Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆153Updated 7 months ago
- ☆155Updated 2 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆139Updated 3 weeks ago
- The different ways to dump lsass☆112Updated 2 weeks ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆196Updated 5 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 3 months ago
- PoC that downloads an executable from a public SSL certificate☆126Updated last month
- Utilities for obfuscating shellcode☆86Updated 5 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated last year
- A Mythic Agent written in PIC C.☆199Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 5 months ago
- Adversary Emulation Framework☆122Updated 2 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆154Updated last month
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated 8 months ago
- Deploy a phishing infrastructure on the fly.☆75Updated 8 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆165Updated 3 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 10 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- A small How-To on creating your own weaponized WSL file☆113Updated last month
- Chrome browser extension-based Command & Control☆166Updated last month
- IPSpinner works as a local proxy that redirects requests through external services.☆72Updated 5 months ago
- Persist like a Dodder☆64Updated 3 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆97Updated 4 months ago