Open Source C2IS (Command and Control Information System)
☆69Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for ODIN
Users that are interested in ODIN are comparing it to the libraries listed below
Sorting:
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Apr 18, 2019Updated 6 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Feb 14, 2026Updated last month
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Jan 23, 2022Updated 4 years ago
- various python scripts☆16Jun 15, 2021Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- Utilities to extract secrets from 1Password☆109Aug 17, 2021Updated 4 years ago
- ☆26Mar 10, 2022Updated 4 years ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- Elevator: Source is a single or co-op elevator experience that is different each time you play.☆12Aug 28, 2015Updated 10 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆72Feb 13, 2021Updated 5 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆56Apr 12, 2020Updated 5 years ago
- htop-like network monitoring tool. The Swiss Army Knife for Network Ops☆31Oct 29, 2025Updated 4 months ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Predict TPM PCR values for future boot☆18Jun 12, 2024Updated last year
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Apr 20, 2021Updated 4 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- FourDeltaOne Source☆11Apr 20, 2019Updated 6 years ago
- A list of weird comparison in SQL☆15May 20, 2022Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Aug 15, 2025Updated 7 months ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- initial commit☆44Nov 19, 2024Updated last year
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- BareMetal for the private/public cloud☆78Feb 18, 2026Updated last month
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Aug 23, 2021Updated 4 years ago