trickster0 / NamelessC2Links
Nameless C2 - A C2 with all its components written in Rust
☆282Updated last year
Alternatives and similar repositories for NamelessC2
Users that are interested in NamelessC2 are comparing it to the libraries listed below
Sorting:
- AV bypass while you sip your Chai!☆226Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆245Updated 3 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆197Updated last year
- yet another AV killer tool using BYOVD☆304Updated 2 years ago
- Ghosting-AMSI☆222Updated 9 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆339Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆231Updated last year
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆259Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆202Updated 2 years ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Updated last year
- RunPE implementation with multiple evasive techniques (2)☆269Updated 4 months ago
- Port of Cobalt Strike's Process Inject Kit☆190Updated last year
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆354Updated 9 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆432Updated 7 months ago
- Reaping treasures from strings in remote processes memory☆285Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆326Updated 2 years ago
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆256Updated 8 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆265Updated 10 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆199Updated 9 months ago
- Evasive shellcode loader☆398Updated last year
- Stage 0☆169Updated last year
- Sleep obfuscation☆265Updated last year
- Open Source C&C Specification☆278Updated 11 months ago
- Execute shellcode files with rundll32☆214Updated 2 years ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Updated last year
- Shaco is a linux agent for havoc☆169Updated 2 years ago
- TeamServer and Client of Exploration Command and Control Framework☆177Updated last month
- ☆259Updated 2 years ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Updated 9 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Updated last year