pure-nomad / CordKitLinks
A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.
☆13Updated 3 months ago
Alternatives and similar repositories for CordKit
Users that are interested in CordKit are comparing it to the libraries listed below
Sorting:
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆73Updated 2 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆168Updated 5 months ago
- ☆182Updated 3 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆172Updated 6 months ago
- ☆203Updated last year
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆169Updated 2 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆202Updated 2 months ago
- ☆28Updated last year
- Ghosting-AMSI☆217Updated 5 months ago
- ☆147Updated 4 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆267Updated 2 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆228Updated 2 weeks ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆110Updated 2 months ago
- Continuous password spraying tool☆193Updated last week
- C++ Reflective Assembly Loader☆28Updated 6 months ago
- Adversary Emulation Framework☆122Updated 2 months ago
- A PoC for Early Cascade process injection technique.☆193Updated 7 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆215Updated 11 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- Inject RDPThief into memory with PowerShell.☆65Updated 8 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆155Updated last month
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 4 months ago
- Tiny and fast port scanner (Sliver edition)☆24Updated 6 months ago
- ☆226Updated 11 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆336Updated 4 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆209Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆98Updated 5 months ago
- OAuth Device Code Phishing Toolkit☆88Updated 3 weeks ago
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆85Updated 3 weeks ago
- The different ways to dump lsass☆185Updated last month