Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
☆107Dec 28, 2023Updated 2 years ago
Alternatives and similar repositories for covert-tube
Users that are interested in covert-tube are comparing it to the libraries listed below
Sorting:
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- ☆18Jun 12, 2025Updated 9 months ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 4 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- ☆17Dec 16, 2021Updated 4 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆502May 16, 2023Updated 2 years ago
- How to spoof the command line when spawning a new process from C#.☆111Dec 28, 2021Updated 4 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated last week
- ☆538Nov 20, 2021Updated 4 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Rodan Exploitation Framework☆103Dec 1, 2025Updated 3 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆128Feb 17, 2026Updated last month
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆95Mar 8, 2023Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆117Dec 26, 2021Updated 4 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆570Mar 28, 2024Updated last year
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- A unique technique to execute binaries from a password protected zip☆1,037Jul 1, 2022Updated 3 years ago
- ☆433Aug 17, 2022Updated 3 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- A C2 post-exploitation framework☆484Jan 24, 2024Updated 2 years ago
- exploiting pakistani cnic number to get location and gender behind it☆14Apr 1, 2025Updated 11 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago