looCiprian / GC2-sheetLinks
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
☆626Updated 5 months ago
Alternatives and similar repositories for GC2-sheet
Users that are interested in GC2-sheet are comparing it to the libraries listed below
Sorting:
- ☆715Updated last year
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆382Updated this week
- Useful C2 techniques and cheat sheets learned from engagements☆548Updated last week
- ☆470Updated 9 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆825Updated last year
- Sandman is a NTP based backdoor for hardened networks.☆806Updated last year
- ↕️🤫 Stealth redirector for your red team operation security☆709Updated 2 months ago
- a tool to help operate in EDRs' blind spots☆757Updated 9 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 4 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆728Updated 2 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆547Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,289Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Updated last year
- A light-weight first-stage C2 implant written in Nim (and Rust).☆913Updated 5 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,179Updated 2 months ago
- Real fucking shellcode encryptor & obfuscator tool☆935Updated this week
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,003Updated last year
- PowerShell Ransomware Simulator with C2 Server☆487Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆608Updated last year
- Script for generating revshells☆476Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆983Updated 2 years ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆799Updated 5 months ago
- Another Windows Local Privilege Escalation from Service Account to System☆907Updated 2 years ago
- This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)☆283Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆386Updated 11 months ago
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆356Updated last year
- Simple & Powerful PowerShell Script Obfuscator☆578Updated 4 months ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆382Updated 2 years ago
- Dominate Active Directory with PowerShell.☆1,049Updated 2 months ago