Windows C++ Implant for Exploration C2
☆45Jan 26, 2026Updated last month
Alternatives and similar repositories for C2Implant
Users that are interested in C2Implant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Core Submodule of Exploration C2☆24Jan 27, 2026Updated last month
- TeamServer and Client of Exploration Command and Control Framework☆177Jan 6, 2026Updated 2 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 11 months ago
- HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint☆16Jan 30, 2025Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- Exploitation of CVE-2025-29969☆57Feb 20, 2026Updated last month
- Proof of Concept CVE-2025-24990 (Agere Systems's driver)☆56Oct 31, 2025Updated 4 months ago
- ☆50Jul 9, 2025Updated 8 months ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 8 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆64May 16, 2025Updated 10 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆46Feb 24, 2026Updated 3 weeks ago
- ☆87Jan 21, 2025Updated last year
- Go Shellcode Loader to be Integrated in Exploration C2☆27Feb 7, 2025Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆191Updated this week
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 11 months ago
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- Pentest Report Manager☆26Apr 2, 2025Updated 11 months ago
- Collection of red team techniques.☆69Apr 25, 2025Updated 10 months ago
- A Reflective Loader for macOS☆148Jul 20, 2025Updated 8 months ago
- ☆20Jul 23, 2023Updated 2 years ago
- ☆126Mar 23, 2025Updated last year
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- 内存加载FRP☆10Sep 11, 2023Updated 2 years ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆30Oct 2, 2025Updated 5 months ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- ☆36Jul 1, 2025Updated 8 months ago
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 3 months ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated last year
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Nov 19, 2024Updated last year
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- UAC Bypass using UIAccess program QuickAssist☆219Nov 30, 2025Updated 3 months ago
- TLS Examples in Schannel and IO Completion Ports☆10Jun 21, 2022Updated 3 years ago