zarkones / OnionC2Links
C2 writen in Rust & Go powered by Tor network.
☆144Updated 2 months ago
Alternatives and similar repositories for OnionC2
Users that are interested in OnionC2 are comparing it to the libraries listed below
Sorting:
- Adversary Emulation Framework☆125Updated 4 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆97Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 7 months ago
- Chrome browser extension-based Command & Control☆183Updated 3 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆100Updated 7 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆206Updated last month
- LSTAR - CobaltStrike Translated to EN☆22Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Enumerate active EDR's on the system☆139Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆59Updated 5 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆118Updated 4 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- ☆148Updated 5 months ago
- PoC that downloads an executable from a public SSL certificate☆130Updated 3 months ago
- ☆83Updated 5 months ago
- Persist like a Dodder☆65Updated 5 months ago
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆129Updated 2 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆146Updated 3 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 2 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆98Updated last week
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Dynamic shellcode loader with sophisticated evasion capabilities☆207Updated 3 weeks ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated last year
- The best powershell obfuscator ever made☆112Updated 3 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆61Updated 2 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year