githubesson / paradoxLinks
macos stealer poc
☆126Updated 3 months ago
Alternatives and similar repositories for paradox
Users that are interested in paradox are comparing it to the libraries listed below
Sorting:
- C2 writen in Rust & Go powered by Tor network.☆144Updated 2 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆206Updated last month
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 7 months ago
- ☆157Updated 4 months ago
- PoC that downloads an executable from a public SSL certificate☆130Updated 3 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆100Updated 7 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆161Updated 9 months ago
- Deploy a phishing infrastructure on the fly.☆76Updated 10 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆206Updated 10 months ago
- Decrypt GlobalProtect configuration and cookie files.☆151Updated last year
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆96Updated 3 weeks ago
- Adversary Emulation Framework☆125Updated 4 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆246Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 7 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆97Updated 6 months ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Persist like a Dodder☆65Updated 5 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Python3 utility for creating zip files that smuggle additional data for later extraction☆260Updated 5 months ago
- Permanently disable EDRs as local admin☆118Updated 3 weeks ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆151Updated 2 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆61Updated 2 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated 2 weeks ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆98Updated last week
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆129Updated 2 months ago
- An interactive shell to spoof some LOLBins command line☆186Updated last year