magisterquis / jec2
Just Enough C2 - A simple but effective server and implant
☆9Updated 2 years ago
Alternatives and similar repositories for jec2:
Users that are interested in jec2 are comparing it to the libraries listed below
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆26Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- ☆14Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- ☆14Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Loading and executing shellcode in C# without PInvoke.☆20Updated 3 years ago
- ☆16Updated 6 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆12Updated last year
- A tool to sync mythic events with ghostwriter oplog.☆12Updated 3 months ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆14Updated 4 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.☆13Updated 3 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆17Updated 7 years ago
- leaking net-ntlm with webdav☆24Updated 3 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 4 years ago
- post exploitation user monitoring tool☆19Updated 6 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Updated 3 years ago
- ☆11Updated 3 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 4 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago