xpn / BlockchainC2Links
A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2
☆76Updated 6 years ago
Alternatives and similar repositories for BlockchainC2
Users that are interested in BlockchainC2 are comparing it to the libraries listed below
Sorting:
- Initial Commit of Coresploit☆57Updated 4 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Updated 6 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- ☆45Updated 7 years ago
- ☆54Updated 6 years ago
- ☆35Updated 8 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Updated 7 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- ☆36Updated 6 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- Kerberos TGS_REP cracker written in Golang☆57Updated 10 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 6 years ago
- Python api for usage with cobalt strike's External C2 specification☆63Updated 7 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Updated 6 years ago
- F# Implementation to spawn shellcode☆47Updated 7 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Updated 6 years ago
- Microsoft Applocker evasion tool☆39Updated 6 years ago
- Leak windows system info through a docx file☆12Updated 5 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41Updated 6 years ago
- ☆37Updated 7 years ago
- C# implementation of Out-Minidump.ps1☆10Updated 7 years ago
- initial commit☆44Updated last year
- Aggressor Script to Execute Assemblies from Github☆71Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Updated 9 years ago
- Hide Mimikatz From Process Lists☆19Updated 10 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 6 years ago