Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.
☆382Apr 24, 2026Updated last week
Alternatives and similar repositories for conquest
Users that are interested in conquest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stealthy .NET assembly loading using AssemblyNative::LoadFromBuffer☆56Mar 22, 2026Updated last month
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆171Sep 22, 2025Updated 7 months ago
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆296Feb 21, 2026Updated 2 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆140Aug 31, 2025Updated 8 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆69Jan 5, 2026Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Updated version of a long known self deletion technique to work with 24H2.☆62Jun 9, 2025Updated 10 months ago
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆127Mar 30, 2026Updated last month
- Tiny and fast port scanner (Sliver edition)☆30Feb 17, 2026Updated 2 months ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆173Jan 12, 2026Updated 3 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 9 months ago
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated 2 months ago
- ☆44Apr 13, 2026Updated 3 weeks ago
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆298Nov 1, 2025Updated 6 months ago
- Chrome browser extension-based Command & Control☆258Mar 18, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Aliasr is a modern, feature-rich TUI launcher for pentest commands.☆109Apr 23, 2026Updated last week
- COM ViewLogger — new malware keylogging technique☆407Jan 6, 2025Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 8 months ago
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆200Apr 26, 2026Updated last week
- Phantom is project created to perform loading and executing unmanaged code in memory within an IIS environment running in full‑trust mode…☆103Apr 27, 2026Updated last week
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated 2 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆203Jun 17, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is the tool to dump the LSASS process on modern Windows 11☆574Nov 1, 2025Updated 6 months ago
- ☆40Nov 25, 2025Updated 5 months ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆46Jul 9, 2025Updated 9 months ago
- Sleep Obfuscation in Rust☆281Dec 1, 2025Updated 5 months ago
- remote process injections using pool party techniques☆71Jun 29, 2025Updated 10 months ago
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Apr 23, 2026Updated last week
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆154Apr 18, 2025Updated last year
- test☆95Apr 25, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 11 months ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆275Jun 18, 2025Updated 10 months ago
- ☆54May 31, 2025Updated 11 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆552May 9, 2025Updated 11 months ago
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆232Nov 6, 2025Updated 6 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆295Mar 29, 2026Updated last month
- Notion C2 Profile for Mythic☆45Updated this week