looCiprian / GC2-sheet
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
☆578Updated 3 weeks ago
Alternatives and similar repositories for GC2-sheet:
Users that are interested in GC2-sheet are comparing it to the libraries listed below
- ☆707Updated last year
- Useful C2 techniques and cheatsheets learned from engagements☆497Updated 2 weeks ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆912Updated 10 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆804Updated 9 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,214Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,175Updated last year
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆351Updated this week
- ☆469Updated 5 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆585Updated 10 months ago
- Another Windows Local Privilege Escalation from Service Account to System☆844Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆719Updated 3 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆656Updated last year
- PowerShell Ransomware Simulator with C2 Server☆478Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆736Updated 3 weeks ago
- ☆959Updated last month
- This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)☆272Updated 8 months ago
- A light-weight first-stage C2 implant written in Nim (and Rust).☆871Updated 3 weeks ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,186Updated 10 months ago
- Some notes and examples for cobalt strike's functionality☆1,054Updated 3 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆633Updated last year
- a tool to help operate in EDRs' blind spots☆728Updated 4 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,091Updated 2 months ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆786Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆373Updated 6 months ago
- Script for generating revshells☆468Updated 7 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆710Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆963Updated 2 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆543Updated last year