looCiprian / GC2-sheetLinks
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
☆614Updated 4 months ago
Alternatives and similar repositories for GC2-sheet
Users that are interested in GC2-sheet are comparing it to the libraries listed below
Sorting:
- ☆713Updated last year
- Useful C2 techniques and cheatsheets learned from engagements☆541Updated last month
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆997Updated last year
- a tool to help operate in EDRs' blind spots☆752Updated 8 months ago
- ☆470Updated 9 months ago
- Sandman is a NTP based backdoor for hardened networks.☆805Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,274Updated last year
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆824Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 4 years ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆377Updated last week
- PowerShell Ransomware Simulator with C2 Server☆485Updated last year
- Kraken, a modular multi-language webshell coded by @secu_x11☆548Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆728Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,171Updated last month
- A light-weight first-stage C2 implant written in Nim (and Rust).☆905Updated 4 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆705Updated last month
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,196Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆593Updated 9 months ago
- Simple & Powerful PowerShell Script Obfuscator☆573Updated 3 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆689Updated 3 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆468Updated last year
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,168Updated 6 months ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆980Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆930Updated 2 months ago
- An Office365 User Attack Tool☆638Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆717Updated last week
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆353Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆880Updated 2 years ago
- Script for generating revshells☆476Updated 11 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆608Updated last year