sapph2c / bifrostLinks
A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.
☆36Updated 2 years ago
Alternatives and similar repositories for bifrost
Users that are interested in bifrost are comparing it to the libraries listed below
Sorting:
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Updated 2 years ago
- Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.☆62Updated 3 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆35Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆133Updated 4 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 5 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 4 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- PoC-Malware-TTPs☆49Updated 2 years ago
- Reverse shell macro using Word VBA☆17Updated 5 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆89Updated 4 months ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 3 years ago
- An evil bit backdoor for iptables☆55Updated 4 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆34Updated last week
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Updated 2 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆23Updated 3 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Updated 3 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Updated 2 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago