it-gorillaz / lnk2pwn
Malicious Shortcut(.lnk) Generator
☆193Updated 6 years ago
Alternatives and similar repositories for lnk2pwn
Users that are interested in lnk2pwn are comparing it to the libraries listed below
Sorting:
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆213Updated last month
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆277Updated 6 months ago
- Malicious Shortcut(.lnk) Generator☆83Updated 6 years ago
- ☆385Updated 4 years ago
- Bypass AMSI by patching AmsiScanBuffer☆264Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆178Updated last month
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆138Updated last year
- Run Rubeus via Rundll32☆201Updated 5 years ago
- PowerShell Constrained Language Mode Bypass☆264Updated 4 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated 2 years ago
- ☆199Updated 2 weeks ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆328Updated 9 months ago
- Inject remote template link into word document for remote template injection☆175Updated 4 years ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆364Updated last year
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆247Updated 3 years ago
- Koppeling x Metatwin x LazySign☆210Updated 3 years ago
- A C2 framework for initial access in Go☆181Updated 2 years ago
- Collection of remote authentication triggers in C#☆484Updated last year
- A BOF to automate common persistence tasks for red teamers☆276Updated 2 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆170Updated 2 months ago
- Various Cobalt Strike BOFs☆638Updated 2 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆458Updated last year
- Recovering NTLM hashes from Credential Guard☆336Updated 2 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆424Updated 2 years ago
- More examples using the Impacket library designed for learning purposes.☆264Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆258Updated last year
- Load any Beacon Object File using Powershell!☆250Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆242Updated 3 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆231Updated last year