kensh1ro / Willie-C2Links
A Golang implant that uses Discord as a C2 team server
β66Updated 9 months ago
Alternatives and similar repositories for Willie-C2
Users that are interested in Willie-C2 are comparing it to the libraries listed below
Sorting:
- ππͺ² Malleable C2 profiles parser and assembler written in golangβ67Updated last year
- A spin-off research project. Cobalt Strike x Notion collab 2022β53Updated 3 years ago
- golang amsi bypassβ30Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.β83Updated 2 years ago
- DPX - the Doge Packer for eXecutablesβ29Updated 3 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.β114Updated 4 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callbackβ68Updated 3 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrityβ32Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashesβ144Updated 3 years ago
- MacOS C2 Frameworkβ85Updated 4 years ago
- Windows Oracle Database Attack Toolkitβ80Updated 3 years ago
- AV/EDR evasion via direct system calls.β108Updated last year
- Winsocket for Cobalt Strike.β99Updated 2 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assemblyβ60Updated 3 years ago
- Golang evasion tool, execute-assembly .Net fileβ97Updated 3 years ago
- ζ±ηΌθ―θ¨ηΌεShellcodeε θ½½ε¨ζΊδ»£η https://payloads.online/archivers/2022-02-16/1/β78Updated 2 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass processβ61Updated 4 years ago
- Preventing 3rd Party DLLs from Injecting into your Malwareβ25Updated 4 years ago
- the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An autβ¦β34Updated 2 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.β150Updated 3 years ago
- Beacon Object Files.β37Updated last year
- CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Serverβ90Updated 2 years ago
- Cobalt Strike BOF Files with Nim!β86Updated 3 years ago
- Titan: A generic user defined reflective DLL for Cobalt Strikeβ77Updated 2 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC bβ¦β140Updated 3 years ago
- Another Go Shellcode Loader using Windows APIsβ141Updated 3 years ago
- Proof of concept SMB C2 using named pipes in Golangβ25Updated 6 years ago
- dump lsass toolβ38Updated 2 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypassβ131Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershellβ38Updated 3 years ago