PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This project demonstrates that It's possible to build a multi-stage and modular C2 implant made of PICOs.
☆48Nov 9, 2025Updated 4 months ago
Alternatives and similar repositories for PICO-Implant
Users that are interested in PICO-Implant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated 2 years ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 8 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆93Jan 2, 2026Updated 2 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- dcsync bof☆46Feb 13, 2026Updated last month
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- Linker for Beacon Object Files☆170Feb 22, 2026Updated last month
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆172Mar 16, 2026Updated last week
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆30Oct 2, 2025Updated 5 months ago
- ☆40Feb 12, 2026Updated last month
- a BOF implementation of various registry persistence methods☆96Nov 11, 2025Updated 4 months ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 3 months ago
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆164Mar 15, 2026Updated last week
- A BOF that's a BOF Loader and more☆201Jan 17, 2026Updated 2 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 10 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆70Jan 19, 2026Updated 2 months ago
- COM-based DLL Surrogate Injection☆147Dec 9, 2025Updated 3 months ago
- Self Delete DLL☆22Feb 15, 2024Updated 2 years ago
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆154Nov 23, 2025Updated 4 months ago
- ☆12Feb 23, 2015Updated 11 years ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Indirect syscalls + DInvoke made simple.☆95Dec 24, 2024Updated last year
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆129Nov 17, 2025Updated 4 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆148Aug 5, 2025Updated 7 months ago
- ☆53Jun 28, 2025Updated 8 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆200Apr 21, 2025Updated 11 months ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Updated this week
- Example of building an application verifer DLL☆51Jun 1, 2024Updated last year
- A Mythic Agent written in PIC C.☆206Feb 4, 2025Updated last year
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- PrimitiveInjection by using Read, Write and Allocation Primitives.☆53Jun 21, 2025Updated 9 months ago