Evasive Payload Delivery Server & C2 Redirector
☆112Nov 3, 2025Updated 3 months ago
Alternatives and similar repositories for Dispatch
Users that are interested in Dispatch are comparing it to the libraries listed below
Sorting:
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- Random BOFs for LDAP tradecraft☆73Sep 9, 2025Updated 5 months ago
- ☆139Jan 16, 2025Updated last year
- ☆47Dec 5, 2025Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- UDC2 implementation that provides an ICMP C2 channel☆115Nov 24, 2025Updated 3 months ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- Cobalt Strike BOF for evasive .NET assembly execution☆308Mar 31, 2025Updated 10 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 9 months ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 3 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆391Aug 18, 2025Updated 6 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆102Jul 9, 2025Updated 7 months ago
- ☆125Dec 12, 2025Updated 2 months ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆423Sep 29, 2025Updated 4 months ago
- ☆235Oct 8, 2024Updated last year
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆106Feb 16, 2026Updated last week
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- SCEP request tool for AD CS and Intune☆73Oct 24, 2025Updated 4 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆18Jun 20, 2025Updated 8 months ago
- ☆15May 30, 2025Updated 8 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- ☆26Aug 5, 2025Updated 6 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆75Oct 27, 2025Updated 4 months ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆270Jun 18, 2025Updated 8 months ago
- ☆96Aug 3, 2025Updated 6 months ago
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 2 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 7 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆546Nov 23, 2025Updated 3 months ago
- ☆12May 21, 2025Updated 9 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆129Dec 8, 2025Updated 2 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 8 months ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 7 months ago