Windows C++ Implant for Exploration C2
☆48May 11, 2026Updated last week
Alternatives and similar repositories for C2Implant
Users that are interested in C2Implant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Core C++ library for C2 architecture, message handling, and security tooling experiments.☆24May 13, 2026Updated last week
- TeamServer and Client of Exploration Command and Control Framework☆184May 13, 2026Updated last week
- HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint☆16Jan 30, 2025Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆18Jun 3, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exploitation of CVE-2025-29969☆65Feb 20, 2026Updated 3 months ago
- Proof of Concept CVE-2025-24990 (Agere Systems's driver)☆58Oct 31, 2025Updated 6 months ago
- ☆50Jul 9, 2025Updated 10 months ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 10 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated 2 months ago
- Go Shellcode Loader to be Integrated in Exploration C2☆27Feb 7, 2025Updated last year
- ☆101Jan 21, 2025Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆198Mar 19, 2026Updated 2 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆24Apr 16, 2025Updated last year
- Pentest Report Manager☆27Apr 2, 2025Updated last year
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- Collection of red team techniques.☆70Apr 25, 2025Updated last year
- A Reflective Loader for macOS☆149Jul 20, 2025Updated 10 months ago
- ☆20Jul 23, 2023Updated 2 years ago
- ☆125Mar 23, 2025Updated last year
- 内存加载FRP☆10Sep 11, 2023Updated 2 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated 2 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 3 years ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆32Oct 2, 2025Updated 7 months ago
- A collection of sample code used in some experiments with Sliver C2☆17Mar 28, 2023Updated 3 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆14Jan 9, 2024Updated 2 years ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- ☆37Jul 1, 2025Updated 10 months ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated last year
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Nov 19, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 9 months ago
- Linux Process Injection via Seccomp Notifier☆96Dec 9, 2025Updated 5 months ago
- UAC Bypass using UIAccess program QuickAssist☆233Nov 30, 2025Updated 5 months ago
- TLS Examples in Schannel and IO Completion Ports☆11Jun 21, 2022Updated 3 years ago
- GateSentinel 是一个现代化的 C2 (Command and Control) 框架,专为安全研究和渗透测试设计。该项目采用 Go 语言开发服务端,C 语言开发客户端,提供了强大的远程控制和管理功能。☆286Jul 17, 2025Updated 10 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 10 months ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago