jconwell / secret_handshakeLinks
A prototype malware C2 channel using x509 certificates over mTLS
☆152Updated last year
Alternatives and similar repositories for secret_handshake
Users that are interested in secret_handshake are comparing it to the libraries listed below
Sorting:
- Cortex XDR Config Extractor☆133Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆180Updated 2 years ago
- ☆120Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆95Updated 2 years ago
- PowerShell Obfuscation and Data Science☆176Updated 3 years ago
- ☆222Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- ☆119Updated 5 months ago
- Collection of random RedTeam scripts.☆208Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- ☆120Updated 4 years ago
- Living Off the Foreign Land setup scripts☆70Updated 6 months ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Malware As A Service☆135Updated last year
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- C2 Automation using Linode☆84Updated 2 years ago
- ☆134Updated 2 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆102Updated 5 months ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- pysnaffler☆102Updated 3 weeks ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆97Updated last year
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145Updated last year
- Decrypt GlobalProtect configuration and cookie files.☆150Updated last year
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- ☆159Updated 2 months ago
- ☆69Updated last year