C2 redirector as a web API
☆10May 22, 2021Updated 4 years ago
Alternatives and similar repositories for CobaltStrike-Redirector
Users that are interested in CobaltStrike-Redirector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 4 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- ☆13Jun 22, 2017Updated 8 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆18Mar 4, 2023Updated 3 years ago
- ☆15Mar 30, 2022Updated 4 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Artemis - C++ Hell's Gate Syscall Implementation☆34Aug 16, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Beacon Object File allowing creation of Beacons in different sessions.☆84May 23, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated 2 years ago
- ECED440 Computer Security☆11Apr 6, 2026Updated last month
- A dynamic HTTP/S stager that lets one shellcode loader be reused for different encrypted payloads - no rebuilds.☆20Oct 1, 2025Updated 7 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Oct 17, 2023Updated 2 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Jan 19, 2023Updated 3 years ago
- ☆24Oct 19, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A fast and powerful CLI tool for finding secrets and other data in files, web pages, and other text sources. Supports multi-threading and…☆22Apr 2, 2026Updated last month
- API hooking and code injection made easy!☆40Aug 22, 2023Updated 2 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆42May 17, 2019Updated 6 years ago
- A C# tool for extracting information from SCCM PXE boot media.☆53Jan 14, 2026Updated 3 months ago
- Plugin for NOPing instructions in IDA☆21May 9, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An authenticator that implements two-step verification service using the Time-base OTP algorithm. (CSE Project)☆13Apr 9, 2025Updated last year
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Feb 7, 2022Updated 4 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆51Jun 13, 2021Updated 4 years ago
- ClickForClickOnce - Generate configurable clickonce payloads☆93Apr 17, 2026Updated 3 weeks ago
- A small red team course☆40Jun 6, 2023Updated 2 years ago