Logging tool intended for red team usage
☆36Dec 5, 2025Updated 3 months ago
Alternatives and similar repositories for Clio
Users that are interested in Clio are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆26Nov 8, 2024Updated last year
- ☆17Jan 9, 2025Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- ☆38Mar 28, 2025Updated 11 months ago
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- Panoptes Endpoint Detection and Response Solution☆44Mar 7, 2026Updated 2 weeks ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 9 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- ☆31Dec 5, 2024Updated last year
- Your Skyfall Infrastructure Pack☆91Jan 25, 2026Updated last month
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆189Mar 14, 2025Updated last year
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 4 months ago
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆43Jan 6, 2026Updated 2 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆110Updated this week
- Automated Evilginx phishlet creator Extension for Burpsuite☆65Jan 10, 2025Updated last year
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆200Apr 21, 2025Updated 11 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆108Jan 26, 2026Updated last month
- ☆53Oct 29, 2024Updated last year
- ☆54Mar 16, 2026Updated last week
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 7 months ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 11 months ago
- ☆16Dec 7, 2025Updated 3 months ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- ☆53Feb 4, 2025Updated last year
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆61Feb 26, 2025Updated last year
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated 2 years ago
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated 2 months ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆225Mar 13, 2026Updated last week
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year