zarkones / BloodfangC2View external linksLinks
Modern PIC implant for Windows (64 & 32 bit)
☆105Jul 23, 2025Updated 6 months ago
Alternatives and similar repositories for BloodfangC2
Users that are interested in BloodfangC2 are comparing it to the libraries listed below
Sorting:
- ☆48Oct 14, 2025Updated 4 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated last month
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆108Jan 19, 2026Updated 3 weeks ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆88Jan 2, 2026Updated last month
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated 11 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- Thats it! An Open-Source Windows UEFI Rootkit☆28Jul 19, 2025Updated 6 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 10 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Sep 18, 2024Updated last year
- A lexer and parser for Sleep☆20May 14, 2025Updated 9 months ago
- Blog/Journal on how to backdoor VSCode extensions☆76Updated this week
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆433Jun 27, 2025Updated 7 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆129Nov 12, 2025Updated 3 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆282Apr 6, 2025Updated 10 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆259Jun 29, 2024Updated last year
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆184Oct 29, 2025Updated 3 months ago
- find dll base addresses without PEB WALK☆157Jul 13, 2025Updated 7 months ago
- ☆109Feb 17, 2025Updated 11 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆135Apr 18, 2025Updated 9 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆116Jan 20, 2025Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆534May 9, 2025Updated 9 months ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 9 months ago
- UDC2 implementation that provides an ICMP C2 channel☆115Nov 24, 2025Updated 2 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- ☆126Jun 28, 2023Updated 2 years ago
- Cobalt Strike BOF for evasive .NET assembly execution☆307Mar 31, 2025Updated 10 months ago
- A process injection technique using only thread context manipulation☆41Dec 18, 2023Updated 2 years ago
- adws enumeration bof☆162Oct 2, 2025Updated 4 months ago
- ☆259Jan 21, 2024Updated 2 years ago
- ☆57Updated this week
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆81Jun 21, 2025Updated 7 months ago
- bof-launcher - a library for loading, executing and in-memory masking BOFs on Windows (x64, x86) and Linux (x64, x86, aarch64, arm). Read…☆292Feb 6, 2026Updated last week
- Simulate per-process disconnection in red team environments☆113Jun 6, 2025Updated 8 months ago
- Slides and resources from MCTTP 2025 Talk☆66Oct 26, 2025Updated 3 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 3 months ago