kensh1ro / Willie-C2
A Golang implant that uses Discord as a C2 team server
☆65Updated 3 months ago
Alternatives and similar repositories for Willie-C2:
Users that are interested in Willie-C2 are comparing it to the libraries listed below
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆62Updated 10 months ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆81Updated last year
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 2 years ago
- Winsocket for Cobalt Strike.☆97Updated last year
- A powershell poc to load and automatically run Certify and Rubeus from memory.☆17Updated 2 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆53Updated 10 months ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 2 years ago
- golang amsi bypass☆30Updated 3 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆112Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆135Updated 3 years ago
- the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An aut…☆34Updated 2 years ago
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆33Updated 9 months ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- MacOS C2 Framework☆83Updated 3 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 2 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆58Updated 2 years ago
- 针对多个框架的高度自定义的内å˜é©¬ä¸€é”®æ‰“入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆46Updated last year
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 5 months ago
- A Cobalt Strike memory evasion loader for redteamers☆98Updated 2 years ago
- The poc for CVE-2022-26809 RCE via RPC will be updated here.☆20Updated 2 years ago
- Golang evasion tool, execute-assembly .Net file☆95Updated 2 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆108Updated 2 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 3 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆51Updated 4 years ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆75Updated 2 years ago
- CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server☆89Updated 2 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- Windows Oracle Database Attack Toolkit☆81Updated 2 years ago