jconwell / secret_handshakeLinks
A prototype malware C2 channel using x509 certificates over mTLS
☆151Updated last year
Alternatives and similar repositories for secret_handshake
Users that are interested in secret_handshake are comparing it to the libraries listed below
Sorting:
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- ☆124Updated 4 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Updated 3 years ago
- Living Off the Foreign Land setup scripts☆74Updated 10 months ago
- ☆132Updated 2 years ago
- ☆121Updated last year
- Malware As A Service☆136Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 3 years ago
- PowerShell Obfuscation and Data Science☆180Updated 3 years ago
- ☆223Updated 2 years ago
- Koppeling x Metatwin x LazySign☆215Updated 4 years ago
- ☆209Updated 3 years ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆111Updated 8 months ago
- ☆302Updated last year
- ☆215Updated 2 months ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- All kinds of tiny shells☆65Updated 2 years ago
- ☆120Updated 9 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- ☆85Updated 3 years ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Updated 2 years ago
- ☆164Updated 6 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆102Updated last year