itaymigdal / Nimbo-C2Links
Nimbo-C2 is yet another (simple and lightweight) C2 framework
☆434Updated 2 months ago
Alternatives and similar repositories for Nimbo-C2
Users that are interested in Nimbo-C2 are comparing it to the libraries listed below
Sorting:
- Go shellcode loader that combines multiple evasion techniques☆385Updated 2 years ago
- ☆332Updated 2 years ago
- Command and Control Framework written in C#☆428Updated 2 years ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆486Updated 5 months ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆447Updated 2 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆461Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆615Updated last year
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆382Updated 2 years ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆374Updated 2 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆497Updated 2 years ago
- Cobalt Strike random C2 Profile generator☆676Updated 2 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆466Updated 3 years ago
- CPP AV/EDR Killer☆453Updated last year
- Shellcode loader generator with multiples features☆497Updated 10 months ago
- grim reaper c2☆341Updated 2 years ago
- Fileless Command Execution for Lateral Movement in Nim☆379Updated last year
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆431Updated 2 years ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆444Updated last year
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆266Updated 2 years ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆573Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆290Updated 6 months ago
- UAC Bypass By Abusing Kerberos Tickets☆500Updated 2 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆650Updated 2 months ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆585Updated 10 months ago
- This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)☆283Updated last year
- An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memor…☆454Updated 6 months ago
- Windows Token Stealing Expert☆481Updated last year
- HVNC for Cobalt Strike☆1,277Updated last year
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆811Updated 2 years ago
- Terminate AV/EDR Processes using kernel driver☆348Updated 2 years ago