looCiprian / GC2-sheetLinks
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
☆601Updated 3 months ago
Alternatives and similar repositories for GC2-sheet
Users that are interested in GC2-sheet are comparing it to the libraries listed below
Sorting:
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆960Updated last year
- ☆713Updated last year
- a tool to help operate in EDRs' blind spots☆739Updated 7 months ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆369Updated this week
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆814Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,247Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆556Updated 3 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆520Updated last month
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆602Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆672Updated last month
- EDR Lab for Experimentation Purposes☆1,281Updated 2 months ago
- PowerShell Ransomware Simulator with C2 Server☆486Updated last year
- A light-weight first-stage C2 implant written in Nim (and Rust).☆897Updated 3 months ago
- Simple & Powerful PowerShell Script Obfuscator☆569Updated last month
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆721Updated 2 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,675Updated 7 months ago
- Dumping DPAPI credz remotely☆1,158Updated 3 months ago
- Useful C2 techniques and cheatsheets learned from engagements☆515Updated this week
- Real fucking shellcode encryptor & obfuscator tool☆915Updated last week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,187Updated last year
- ☆993Updated 4 months ago
- PowerShell Script Obfuscator☆558Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆869Updated 2 years ago
- ↕️🤫 Stealth redirector for your red team operation security☆694Updated 10 months ago
- An offensive data enrichment pipeline☆761Updated this week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆786Updated 3 months ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆795Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆637Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆579Updated 7 months ago