jconwell / secret_handshakeLinks
A prototype malware C2 channel using x509 certificates over mTLS
☆151Updated last year
Alternatives and similar repositories for secret_handshake
Users that are interested in secret_handshake are comparing it to the libraries listed below
Sorting:
- ☆223Updated 2 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆107Updated 7 months ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- PowerShell Obfuscation and Data Science☆180Updated 3 years ago
- ☆120Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆122Updated 3 years ago
- ☆122Updated 4 years ago
- Living Off the Foreign Land setup scripts☆73Updated 9 months ago
- ☆142Updated 2 years ago
- ☆132Updated 2 years ago
- Collection of random RedTeam scripts.☆207Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆189Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- Async Python library to parse local and remote disk images.☆81Updated 5 months ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 3 years ago
- ☆163Updated 5 months ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆121Updated last year
- ☆119Updated 8 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- ☆209Updated 3 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆95Updated 2 years ago
- ☆153Updated 8 months ago
- Malware As A Service☆135Updated last year
- ☆212Updated last month