jconwell / secret_handshake
A prototype malware C2 channel using x509 certificates over mTLS
☆153Updated last year
Alternatives and similar repositories for secret_handshake:
Users that are interested in secret_handshake are comparing it to the libraries listed below
- ☆299Updated 6 months ago
- Leak NTLM via Website tab in teams via MS Office☆79Updated last year
- ☆119Updated last year
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- ☆191Updated 7 months ago
- ☆220Updated last year
- ☆130Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- ☆116Updated 3 years ago
- Malware As A Service☆132Updated last year
- ☆208Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆91Updated last year
- Living Off the Foreign Land setup scripts☆67Updated 2 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆272Updated last year
- ☆117Updated last month
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆114Updated last week
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 8 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆311Updated last year
- Utilities for obfuscating shellcode☆66Updated last month
- ☆143Updated last month
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆198Updated 11 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- ☆150Updated 3 months ago
- ☆122Updated last year
- Apply a divide and conquer approach to bypass EDRs☆280Updated last year
- Python utility that generates "imageless" QR codes in various formats☆119Updated 9 months ago