maxamin / exploitpack-from-an-APT-infrastructureLinks
exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure
☆12Updated 3 years ago
Alternatives and similar repositories for exploitpack-from-an-APT-infrastructure
Users that are interested in exploitpack-from-an-APT-infrastructure are comparing it to the libraries listed below
Sorting:
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Updated 3 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆187Updated 6 months ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆96Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆221Updated 3 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆117Updated 4 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆177Updated 3 years ago
- Windows NTLM Authentication Backdoor☆241Updated last year
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Updated 4 years ago
- Windows Oracle Database Attack Toolkit☆80Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆143Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Updated 4 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆52Updated 3 years ago
- C# C2 Framework centered around Stage 1 operations☆210Updated 3 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆200Updated 4 years ago
- Windows shellcode encoding and encrypting tool☆20Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- CVE-2021-40444☆66Updated 4 years ago
- Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.☆62Updated 3 years ago
- A Golang implant that uses Discord as a C2 team server☆65Updated last year
- PowerShell Asynchronous TCP Reverse Shell☆158Updated 2 months ago
- ☆56Updated 9 months ago
- UDP implant☆67Updated 4 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 4 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆252Updated 4 years ago
- Beacon Object File PoC implementation of KillDefender☆235Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated last week
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆65Updated last year
- ☆163Updated 3 years ago