itaymigdal / Nimbo-C2
Nimbo-C2 is yet another (simple and lightweight) C2 framework
☆378Updated 4 months ago
Alternatives and similar repositories for Nimbo-C2:
Users that are interested in Nimbo-C2 are comparing it to the libraries listed below
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆404Updated last year
- Go shellcode loader that combines multiple evasion techniques☆363Updated last year
- Command and Control Framework written in C#☆394Updated last year
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆412Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆564Updated 7 months ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆478Updated last year
- Fileless Command Execution for Lateral Movement in Nim☆367Updated last year
- Nim-based assembly packer and shellcode loader for opsec & profit☆464Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆373Updated 7 months ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆468Updated 2 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆461Updated 2 years ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆357Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆531Updated 2 months ago
- Terminate AV/EDR Processes using kernel driver☆340Updated last year
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆451Updated 8 months ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆447Updated 11 months ago
- Bypassing UAC with SSPI Datagram Contexts☆430Updated last year
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆419Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆262Updated last month
- grim reaper c2☆334Updated 2 years ago
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆770Updated 2 years ago
- Shellcode loader generator with multiples features☆457Updated 2 months ago
- shellcode loader for your evasion needs☆315Updated 4 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆909Updated 9 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆644Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆568Updated 8 months ago
- CPP AV/EDR Killer☆390Updated last year
- XLL Phishing Tradecraft☆412Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆424Updated last year
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆472Updated last year