latortuga71 / YoutubeAsAC2Links
Poc of using youtube comments for C2 communications
☆10Updated 4 years ago
Alternatives and similar repositories for YoutubeAsAC2
Users that are interested in YoutubeAsAC2 are comparing it to the libraries listed below
Sorting:
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆18Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆52Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 11 months ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- Citrix Phishlet☆24Updated 4 years ago
- ☆49Updated 2 years ago
- Deobfuscation of XorStringsNet☆14Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 2 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- Some of my custom "tools".☆29Updated 3 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- A port of classic netcat to C#☆34Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P …☆16Updated 3 years ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆21Updated 2 years ago
- Custom Python shellcode encryptor and obfuscator☆14Updated 3 months ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆41Updated 4 years ago
- ☆20Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago