latortuga71 / YoutubeAsAC2Links
Poc of using youtube comments for C2 communications
☆10Updated 4 years ago
Alternatives and similar repositories for YoutubeAsAC2
Users that are interested in YoutubeAsAC2 are comparing it to the libraries listed below
Sorting:
- Deobfuscation of XorStringsNet☆14Updated last year
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆40Updated 3 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated last year
- Generate droppers with encrypted payloads automatically.☆54Updated 4 years ago
- A repository with my code snippets for research/education purposes.☆52Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆42Updated 4 years ago
- maldev obviously☆28Updated 8 months ago
- C# project to Reflectively load .Net assemblies in memory☆19Updated last year
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Updated 3 years ago
- Citrix Phishlet☆24Updated 5 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Updated 4 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Updated 3 years ago
- It's what all the kids are talking about☆12Updated 2 years ago
- ☆49Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Updated 2 years ago
- ☆61Updated 2 years ago
- A .NET binary loader that bypasses AMSI☆45Updated 4 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Updated 4 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Updated 3 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 3 years ago