looCiprian / GC2-sheetLinks
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
☆632Updated 7 months ago
Alternatives and similar repositories for GC2-sheet
Users that are interested in GC2-sheet are comparing it to the libraries listed below
Sorting:
- ☆715Updated last year
- Useful C2 techniques and cheat sheets learned from engagements☆558Updated 2 months ago
- a tool to help operate in EDRs' blind spots☆765Updated 11 months ago
- PowerShell Ransomware Simulator with C2 Server☆492Updated last year
- Sandman is a NTP based backdoor for hardened networks.☆810Updated last year
- ☆471Updated 11 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,036Updated last year
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆831Updated last year
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆386Updated last week
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,306Updated 2 years ago
- A light-weight first-stage C2 implant written in Nim (and Rust).☆921Updated 7 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆717Updated 4 months ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆550Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆718Updated 5 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,169Updated 9 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆740Updated 2 weeks ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,195Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆732Updated 2 years ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆616Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆470Updated last year
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆384Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆969Updated 3 weeks ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆806Updated 7 months ago
- Script for generating revshells☆478Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆387Updated last year
- This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)☆283Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆634Updated 3 weeks ago
- Scan installed EDRs and AVs on Windows☆598Updated 4 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆748Updated 2 years ago