optiv / IvyLinks
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
☆745Updated last year
Alternatives and similar repositories for Ivy
Users that are interested in Ivy are comparing it to the libraries listed below
Sorting:
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆978Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,257Updated last year
- A .NET Framework 4.0 Windows Agent☆488Updated this week
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆412Updated 10 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆966Updated last year
- Framework for Kerberos relaying☆924Updated 3 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆425Updated 3 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆740Updated 10 months ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,147Updated 2 months ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆375Updated 2 years ago
- Various Cobalt Strike BOFs☆657Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆707Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆945Updated last year
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆715Updated last year
- A unique technique to execute binaries from a password protected zip☆1,029Updated 3 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆781Updated last year
- ☆522Updated 3 years ago
- ☆1,001Updated 4 months ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆866Updated 4 years ago
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆796Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,149Updated 4 years ago
- TCP Port Redirection Utility☆725Updated 2 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,086Updated 2 years ago
- Get file less command execution for lateral movement.☆625Updated 3 years ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆483Updated 2 years ago
- PIC lsass dumper using cloned handles☆589Updated 2 years ago
- ☆416Updated 2 years ago
- NTLM relaying for Windows made easy☆568Updated 2 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆489Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆681Updated last year