lum8rjack / caddy-c2Links
Caddy v2 module to filter requests based on C2 profiles
☆15Updated 4 months ago
Alternatives and similar repositories for caddy-c2
Users that are interested in caddy-c2 are comparing it to the libraries listed below
Sorting:
- ☆83Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆52Updated last month
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆89Updated 11 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆102Updated 3 months ago
- Local SYSTEM auth trigger for relaying - X☆138Updated last month
- AzureAD beacon object files☆126Updated 8 months ago
- A hoontr must hoont☆87Updated 3 weeks ago
- Local SYSTEM auth trigger for relaying☆156Updated last month
- ☆133Updated 6 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆122Updated 2 months ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆122Updated last week
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆49Updated 3 months ago
- Evasive Payload Delivery Server & C2 Redirector☆99Updated 3 weeks ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆149Updated 6 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆166Updated 8 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆140Updated 5 months ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆30Updated 11 months ago
- Find .net assemblies locally☆122Updated 2 years ago
- ForsHops☆146Updated 5 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆112Updated last month
- A BOF to enumerate system process, their protection levels, and more.☆119Updated 9 months ago
- ☆130Updated 5 months ago
- ☆57Updated 6 months ago
- BOF to decrypt Signal Desktop chat logs☆66Updated 6 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated last year
- Lockless BOF☆77Updated 4 months ago
- TokenCert☆100Updated 9 months ago
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆81Updated 3 weeks ago
- Lateral Movement via the .NET Profiler☆82Updated 9 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆124Updated last week