looCiprian / GC2-sheet
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
☆536Updated last month
Related projects ⓘ
Alternatives and complementary repositories for GC2-sheet
- Killer tool is designed to bypass AV/EDR security tools using various evasive techniques.☆753Updated 4 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆856Updated 4 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆549Updated 4 months ago
- ☆673Updated 7 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,139Updated last year
- Useful C2 techniques and cheatsheets learned from engagements☆425Updated 3 weeks ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆770Updated 7 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆740Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆551Updated 3 years ago
- ☆462Updated 2 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆514Updated 8 months ago
- A light-weight first-stage C2 implant written in Nim.☆801Updated 3 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆661Updated last month
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,148Updated last year
- PowerShell Ransomware Simulator with C2 Server☆463Updated 9 months ago
- Another Windows Local Privilege Escalation from Service Account to System☆801Updated last year
- Simple & Powerful PowerShell Script Obfuscator☆454Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆700Updated last year
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆325Updated this week
- ↕️🤫 Stealth redirector for your red team operation security☆627Updated 2 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆632Updated 9 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆638Updated 5 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆623Updated 7 months ago
- HVNC for Cobalt Strike☆1,156Updated 11 months ago
- Real fucking shellcode encryptor & obfuscator tool☆735Updated this week
- ☆275Updated last year
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆255Updated last year
- Script for generating revshells☆453Updated last month