grines / goc2Links
MacOS C2 Framework
☆83Updated 3 years ago
Alternatives and similar repositories for goc2
Users that are interested in goc2 are comparing it to the libraries listed below
Sorting:
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆62Updated 2 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆63Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆83Updated 2 years ago
- Beacon Object Files.☆35Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Updated 3 years ago
- AutoStart teamserver and listeners with services☆73Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 4 years ago
- ☆70Updated 4 years ago
- Golang Direct Syscall☆30Updated 3 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- CVE-2019-1040 with Kerberos delegation☆33Updated 3 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆55Updated last year
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆140Updated 3 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 8 months ago
- ☆18Updated 3 years ago
- ☆56Updated 4 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆60Updated 4 years ago
- Security Support Provider Interface☆46Updated 5 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆143Updated 4 years ago