jconwell / secret_handshake
A prototype malware C2 channel using x509 certificates over mTLS
☆146Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for secret_handshake
- ☆179Updated this week
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆248Updated last year
- Python utility that generates "imageless" QR codes in various formats☆100Updated 3 months ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆118Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- ☆217Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆258Updated 2 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆217Updated last year
- ☆127Updated 3 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆158Updated last year
- ☆118Updated last year
- ☆294Updated 3 weeks ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆230Updated 9 months ago
- Malware As A Service☆119Updated 8 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆251Updated last year
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆78Updated 11 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆123Updated 3 months ago
- An interactive shell to spoof some LOLBins command line☆180Updated 9 months ago
- The most average C2 ever (MACE)☆96Updated 2 years ago
- WNF Code Execution Library Using C#☆108Updated 4 years ago
- ☆129Updated last month
- ☆181Updated 2 months ago
- Infect Shared Files In Memory for Lateral Movement☆192Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆72Updated 2 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆206Updated last week
- Your syscall factory☆121Updated 2 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆301Updated last year