Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.
☆189Mar 14, 2025Updated last year
Alternatives and similar repositories for Cloudflare-Redirector
Users that are interested in Cloudflare-Redirector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆138Dec 7, 2025Updated 3 months ago
- A Mythic Agent written in PIC C.☆205Feb 4, 2025Updated last year
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆279Apr 17, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆439Dec 21, 2023Updated 2 years ago
- Lateral Movement via the .NET Profiler☆99Nov 21, 2024Updated last year
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆347Nov 19, 2024Updated last year
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆128Jan 17, 2026Updated 2 months ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- PoC demonstrating a multi process injection chain aimed at remotely executing shellcode☆259Jan 21, 2024Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆203Apr 21, 2025Updated 11 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆681Aug 15, 2025Updated 7 months ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- Windows remote execution multitool☆786Updated this week
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- ☆234Oct 8, 2024Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆309Dec 9, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆544Feb 13, 2024Updated 2 years ago
- This repository implements Threadless Injection in C☆172Dec 23, 2023Updated 2 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆640May 8, 2025Updated 10 months ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- "Service-less" driver loading☆184Nov 28, 2024Updated last year
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆169Nov 17, 2025Updated 4 months ago
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆865Feb 3, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆100Sep 1, 2024Updated last year
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- early cascade injection PoC based on Outflanks blog post☆240Nov 7, 2024Updated last year
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆226Nov 23, 2023Updated 2 years ago