whiterabb17 / gryphonLinks
Triple OS Malware development framework [ MacOS, Linux & Windows ]
☆17Updated 10 months ago
Alternatives and similar repositories for gryphon
Users that are interested in gryphon are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆57Updated 11 months ago
- a small wiper malware programmed in c#☆58Updated 2 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆61Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- ☆41Updated last year
- Public repo of some woking evilginx phishlets☆38Updated 11 months ago
- Havoc python api☆43Updated 2 years ago
- ☆84Updated 3 years ago
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆39Updated 3 weeks ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 5 months ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆45Updated last year
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆102Updated 6 months ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 8 years ago
- LSTAR - CobaltStrike Translated to EN☆22Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆46Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆54Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 2 years ago
- Create and enumerate hidden desktops.☆88Updated last year
- An offensive security framework for writing payloads☆18Updated 3 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆13Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆91Updated last month
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- .NET Antivirus Evasion Tool (Exe2Bat)☆40Updated 3 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆30Updated 3 years ago