ricardojoserf / SharpCovertTubeLinks
Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube
☆95Updated last year
Alternatives and similar repositories for SharpCovertTube
Users that are interested in SharpCovertTube are comparing it to the libraries listed below
Sorting:
- ☆106Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆168Updated last year
- An interactive shell to spoof some LOLBins command line☆187Updated last year
- Continuous password spraying tool☆195Updated 3 weeks ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆179Updated 6 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆119Updated 10 months ago
- Inject RDPThief into memory with PowerShell.☆65Updated 9 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆105Updated 3 years ago
- Our Tips&Tricks☆127Updated 9 months ago
- PowerShell Obfuscator☆216Updated 2 months ago
- ☆161Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 4 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆114Updated 4 months ago
- C2 writen in Rust & Go powered by Tor network.☆148Updated 3 weeks ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 8 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆204Updated 10 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 9 months ago
- ☆305Updated 8 months ago
- ☆24Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆128Updated 7 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆249Updated 6 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆118Updated 5 months ago
- A C2 framework built for my bachelors thesis☆56Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆48Updated last year
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆170Updated 5 months ago