mez-0 / citadelLinks
A Payload Analysis Framework
☆114Updated 3 months ago
Alternatives and similar repositories for citadel
Users that are interested in citadel are comparing it to the libraries listed below
Sorting:
- Internal Monologue BOF☆79Updated last year
- ☆108Updated last year
- .NET tool used to enrich RPC telemetry☆101Updated 7 months ago
- Impersonate Tokens using only NTAPI functions☆83Updated 9 months ago
- Blog/Journal on how to backdoor VSCode extensions☆76Updated 6 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Updated 6 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆135Updated 6 months ago
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- RPC to WebClient startup☆54Updated 5 months ago
- A hoontr must hoont☆101Updated 2 months ago
- Sniffing files generator☆60Updated 11 months ago
- rust port of pspy with support for process monitoring over dbus☆35Updated 3 weeks ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Updated last year
- A Mythic Agent written in PIC C.☆206Updated 11 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆128Updated 3 months ago
- A python script that automates a C2 Profile build☆48Updated last month
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Updated last year
- BOF for C2 framework☆44Updated last year
- Utilizng an MCP Server to communicate with your C2☆86Updated 8 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆154Updated 2 months ago
- ☆55Updated 7 months ago
- Commandline spoofing on Windows☆92Updated 2 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 8 months ago
- macOS dylib stager☆36Updated last year
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 6 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Updated 11 months ago
- Lifetime AMSI bypass.☆36Updated 9 months ago