A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
☆18Jun 1, 2024Updated last year
Alternatives and similar repositories for C2-Tool-Collection
Users that are interested in C2-Tool-Collection are comparing it to the libraries listed below
Sorting:
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- ☆13Jul 15, 2021Updated 4 years ago
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 11 months ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor☆46Apr 24, 2019Updated 6 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆25Mar 7, 2023Updated 2 years ago
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆65Jun 10, 2025Updated 8 months ago
- Create file system symbolic links from low privileged user accounts within PowerShell☆95Jun 20, 2022Updated 3 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated 2 months ago
- A public, open source physical security methodology☆47Apr 2, 2024Updated last year
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆45Mar 9, 2022Updated 3 years ago
- A minimalist, Astro powered, self-hosted start page☆10Updated this week
- ☆16Apr 21, 2023Updated 2 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- ActiveMQ Deserialization RCE☆15Aug 30, 2019Updated 6 years ago
- Import custom queries into BloodHound CE from a legacy BloodHound JSON file.☆10Mar 22, 2024Updated last year
- ☆11Jun 24, 2024Updated last year
- Exploit for CVE-2023-38571☆13Sep 27, 2023Updated 2 years ago
- A tool to sign or resign an existing .NET assembly and update all the references to it.☆15Oct 21, 2015Updated 10 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13May 27, 2023Updated 2 years ago
- AMD Generic Encapsulated Software Architecture Platform Security Processor Configuration Block manipulation library☆16Dec 18, 2025Updated 2 months ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- ☆16Aug 25, 2025Updated 6 months ago
- ☆11Mar 19, 2019Updated 6 years ago
- C++, Qt: Remote desktop application based on VNC protocol for Mac OS. One server - multiple clients.☆14Sep 4, 2023Updated 2 years ago
- Simple program to stream offsets for your game cheat, Was reversing some p2c and decided to recreate a better version of this function fo…☆11Sep 12, 2022Updated 3 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 3 years ago