magisterquis / jec2
Just Enough C2 - A simple but effective server and implant
☆9Updated 2 years ago
Alternatives and similar repositories for jec2:
Users that are interested in jec2 are comparing it to the libraries listed below
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.☆13Updated 4 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆27Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- golang String Obfuscate☆9Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Showing how proof-of-work can be used to evade antivirus emulators.☆11Updated 5 months ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- leaking net-ntlm with webdav☆25Updated 4 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆14Updated 4 years ago
- ☆17Updated 6 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last week
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated last year
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- ☆14Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆13Updated 5 months ago
- ☆15Updated last year
- ☆12Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆12Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- My nim learning experiments☆11Updated 2 years ago