rasta-mouse / OST-C2-Spec
Open Source C&C Specification
☆241Updated 3 weeks ago
Alternatives and similar repositories for OST-C2-Spec:
Users that are interested in OST-C2-Spec are comparing it to the libraries listed below
- Slides & Code snippets for a workshop held @ x33fcon 2024☆255Updated 9 months ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆283Updated 10 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆180Updated 6 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆443Updated last month
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆348Updated 3 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆183Updated 3 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆195Updated 9 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆289Updated last year
- Use hardware breakpoint to dynamically change SSN in run-time☆245Updated 11 months ago
- Extracting NetNTLM without touching lsass.exe☆235Updated last year
- ☆274Updated last year
- A BOF that runs unmanaged PEs inline☆578Updated 5 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆287Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆435Updated last month
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆308Updated last year
- Attempt at Obfuscated version of SharpCollection☆205Updated last month
- ☆299Updated last year
- ☆171Updated 4 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆290Updated 4 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆214Updated last year
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆421Updated last year
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆532Updated 2 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆319Updated last year
- Kill AV/EDR leveraging BYOVD attack☆343Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆184Updated last year
- ☆254Updated last year
- .net config loader☆313Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆181Updated last year