whiterabb17 / gryphonLinks
Triple OS Malware development framework [ MacOS, Linux & Windows ]
☆17Updated 11 months ago
Alternatives and similar repositories for gryphon
Users that are interested in gryphon are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆56Updated last year
- An offensive security framework for writing payloads☆18Updated 3 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- ☆16Updated 5 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- Havoc python api☆43Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- Public repo of some woking evilginx phishlets☆38Updated last year
- a small wiper malware programmed in c#☆58Updated 3 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- ☆84Updated 3 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆31Updated 3 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆35Updated 3 years ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆13Updated 10 months ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆91Updated 2 months ago
- Koadic C3 COM Command & Control - JScript RAT☆44Updated 8 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 11 months ago
- Scripts permettant de contourner la protection antivirale de Windows Defender via la technique de Direct Syscalls avec une injection de s…☆30Updated 3 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Updated last year
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆41Updated 4 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- Poc of using youtube comments for C2 communications☆10Updated 4 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago