tharun27102006 / Aether-C2-FrameworkView external linksLinks
π οΈ Explore custom C2 TTPs with Aether-C2-Framework, focusing on lightweight Rust implants and stealthy transport stacks to reduce forensic footprints.
β18Updated this week
Alternatives and similar repositories for Aether-C2-Framework
Users that are interested in Aether-C2-Framework are comparing it to the libraries listed below
Sorting:
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).β68Dec 17, 2025Updated last month
- BYOVD hunter to help prioritize windows drivers worth manual analysisβ74Aug 19, 2025Updated 5 months ago
- Things i do because i saw it on twitter on a weekendβ58Jul 20, 2025Updated 6 months ago
- π‘οΈ Assign AD permissions via PowerShell templates β Simplify and standardize AD delegation with reusable PowerShell templates.β24Jul 27, 2025Updated 6 months ago
- Thats it! An Open-Source Windows UEFI Rootkitβ28Jul 19, 2025Updated 6 months ago
- Just another EDR killerβ94Jan 21, 2026Updated 3 weeks ago
- AI Voice Cloning Desktop Application that runs locally on your computer and doesn't cost anything to runβ45Nov 26, 2025Updated 2 months ago
- string encryption in Nimβ20Jun 15, 2024Updated last year
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.β109Jan 18, 2026Updated 3 weeks ago
- A Windows tool that converts LDIF files to BloodHound CEβ25Dec 20, 2025Updated last month
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23β23Jun 19, 2025Updated 7 months ago
- γβοΈγRing 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.xβ27Apr 10, 2025Updated 10 months ago
- Mythic C2 wrapper for NimSyscallPackerβ25Mar 12, 2025Updated 11 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.β33Aug 18, 2025Updated 5 months ago
- β61Dec 19, 2024Updated last year
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalβ¦β92Jan 14, 2026Updated last month
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dllβ50Jun 16, 2025Updated 7 months ago
- metasploit module for the CVE-2025-24071β26Mar 18, 2025Updated 10 months ago
- β36Nov 8, 2024Updated last year
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.β132Sep 4, 2025Updated 5 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.β79Dec 23, 2023Updated 2 years ago
- A Remote Access Tool developed in C#, enabling complete control of a remote Windows machine, designed for legitimate remote administratioβ¦β130Updated this week
- β48Dec 21, 2025Updated last month
- A powerful, modular, lightweight and efficient command & control framework written in Nim.β219Nov 3, 2025Updated 3 months ago
- Find jmp gadgets for call stack spoofing.β75Oct 1, 2025Updated 4 months ago
- A simple Linux in-memory .so loaderβ33Mar 29, 2023Updated 2 years ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dllβ135Apr 18, 2025Updated 9 months ago
- Find Inbound Email Domainsβ35Dec 21, 2023Updated 2 years ago
- BlackMail is a tool for creating and sending spoof mail.β37Nov 16, 2023Updated 2 years ago
- The Azure Execution Toolβ83Feb 6, 2026Updated last week
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.β38Mar 6, 2025Updated 11 months ago
- A YARA rule generatorβ61Feb 7, 2026Updated last week
- β99Dec 11, 2025Updated 2 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows β built in Rust.β85Apr 26, 2025Updated 9 months ago
- Starter template for vue 3 applications with theme switching, registration, authentication, email verification, and the best 404 Not Founβ¦β11Jan 28, 2022Updated 4 years ago
- NTLM Hash Generatorβ10Apr 2, 2021Updated 4 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activityβ34Apr 26, 2024Updated last year
- Web Recon Tool π An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information β¦β25Nov 17, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.β36Nov 16, 2023Updated 2 years ago