C2
☆123Dec 29, 2025Updated 2 months ago
Alternatives and similar repositories for awesome-C2
Users that are interested in awesome-C2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Apr 18, 2023Updated 2 years ago
- Implementation of several code injection techniques.☆24Mar 12, 2022Updated 4 years ago
- This repository contains my complete resources and coding practices for malware development using Rust 🦀.☆16Jan 15, 2025Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- shellcode-loaders and beacon-loaders☆71Nov 7, 2023Updated 2 years ago
- red or blue☆14Apr 20, 2023Updated 2 years ago
- ☆20Jul 23, 2023Updated 2 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆62Aug 31, 2022Updated 3 years ago
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆267Oct 16, 2024Updated last year
- Windows Thread Pool Injection Havoc Implementation☆34Mar 23, 2024Updated 2 years ago
- 收集常用windows版本内核文件☆35Aug 16, 2023Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66May 2, 2023Updated 2 years ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 2 years ago
- This script will not work with the latest version of chrome☆13May 11, 2025Updated 10 months ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆19Jan 3, 2022Updated 4 years ago
- Walks through the 4-level paging structures in Windows x64☆13Feb 12, 2023Updated 3 years ago
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Modules used by the Havoc Framework☆263Jun 17, 2024Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.☆121May 22, 2025Updated 10 months ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆617Jan 2, 2025Updated last year
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated last year
- ☆16Jun 20, 2022Updated 3 years ago
- It stinks☆103Apr 22, 2022Updated 3 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 3 years ago
- ☆61Jun 26, 2022Updated 3 years ago
- ☆76Jul 22, 2025Updated 8 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Apr 22, 2024Updated last year
- ☆61Jan 9, 2023Updated 3 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Simple 32/64-bit PEs loader.☆139Dec 19, 2018Updated 7 years ago
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆144Mar 16, 2026Updated last week
- ☆13Apr 8, 2022Updated 3 years ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆620Sep 26, 2023Updated 2 years ago