n00py / Slackor
A Golang implant that uses Slack as a command and control server
☆47Updated 4 years ago
Alternatives and similar repositories for Slackor:
Users that are interested in Slackor are comparing it to the libraries listed below
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated last month
- ☆67Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- ☆38Updated 5 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- A web shell for pivoting and lateral movement☆34Updated 7 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆66Updated last year
- Standalone version of my AES Powershell payload for Cobalt Strike.☆110Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆104Updated 2 years ago
- ☆17Updated 4 years ago
- Credential Dumper☆77Updated 5 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆29Updated 5 years ago
- Self-healing RAT utilizing libp2p☆88Updated 4 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆60Updated 6 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆62Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- ☆38Updated 4 years ago
- ☆48Updated 4 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- ☆32Updated 5 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago