logangoins / HeadHunter
HeadHunter Command and Control (C2)
☆18Updated 2 weeks ago
Related projects: ⓘ
- A C2 framework built for my bachelors thesis☆51Updated 2 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 9 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆38Updated 3 months ago
- ☆14Updated 9 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆68Updated 7 months ago
- C++ Code to perform a MiniDump of lsass.exe☆33Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆45Updated 2 months ago
- quick and dirty proof-of-concept to hide shells in images☆48Updated 2 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆78Updated 8 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 4 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆47Updated 3 weeks ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated last year
- Malicious powershell scripts loader designed to avoid detection.☆33Updated last year
- Azure Service Subdomain Enumeration☆39Updated 2 weeks ago
- PowerShell Reverse Shell☆60Updated last year
- ☆46Updated 2 years ago
- ☆48Updated 2 weeks ago
- Lifetime AMSI bypass.☆35Updated 2 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated 9 months ago
- Windows Privilege Escalation☆41Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆51Updated last month
- ☆50Updated 7 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆53Updated 9 months ago
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- VirusTotal Stealer is a DATA Exfiltration tool that exfitrate office documents and tunnel them over VirusTotal API to the Team Server☆62Updated 11 months ago
- ☆24Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆28Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆89Updated 3 months ago