sapph2c / bifrostLinks
A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.
☆36Updated 2 years ago
Alternatives and similar repositories for bifrost
Users that are interested in bifrost are comparing it to the libraries listed below
Sorting:
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆66Updated 3 years ago
- Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.☆60Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 4 years ago
- Bypass Malware Time Delays☆103Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- Basic Dart reverse shell code☆21Updated last year
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- XOR-based shellcode encoder☆31Updated 2 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 3 years ago
- An evil bit backdoor for iptables☆54Updated 4 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆87Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆40Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆94Updated 4 years ago
- PoC-Malware-TTPs☆49Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆84Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year