Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.
☆259Feb 27, 2026Updated last week
Alternatives and similar repositories for conquest
Users that are interested in conquest are comparing it to the libraries listed below
Sorting:
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 3 months ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆167Sep 22, 2025Updated 5 months ago
- Dump processes over WMI with MSFT_MTProcess☆84Feb 13, 2026Updated 3 weeks ago
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated 2 months ago
- Tiny and fast port scanner (Sliver edition)☆27Feb 17, 2026Updated 2 weeks ago
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆256Feb 21, 2026Updated last week
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆140Aug 31, 2025Updated 6 months ago
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆295Nov 1, 2025Updated 4 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆89Jan 2, 2026Updated 2 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated last month
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 8 months ago
- Chrome browser extension-based Command & Control☆239Jul 2, 2025Updated 8 months ago
- This is the tool to dump the LSASS process on modern Windows 11☆560Nov 1, 2025Updated 4 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆27Feb 27, 2025Updated last year
- Virtual Trust Level (VTL 1) secure call tracing☆103Feb 12, 2026Updated 3 weeks ago
- ☆38Apr 15, 2025Updated 10 months ago
- A small How-To on creating your own weaponized WSL file☆122Jul 23, 2025Updated 7 months ago
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆98Updated this week
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆63Jan 5, 2026Updated 2 months ago
- ☆36Jul 1, 2025Updated 8 months ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- COM ViewLogger — new malware keylogging technique☆405Jan 6, 2025Updated last year
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆354Apr 26, 2025Updated 10 months ago
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆133Nov 12, 2025Updated 3 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 10 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆119Jun 10, 2025Updated 8 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆401Jan 14, 2026Updated last month
- Process Injection using Thread Name☆299Apr 18, 2025Updated 10 months ago
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 8 months ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- ☆164Jun 12, 2025Updated 8 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Aug 25, 2025Updated 6 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆313Dec 29, 2025Updated 2 months ago