zarkones / OnionC2Links
C2 writen in Rust & Go powered by Tor network.
☆155Updated 2 months ago
Alternatives and similar repositories for OnionC2
Users that are interested in OnionC2 are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆183Updated 2 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- Adversary Emulation Framework☆129Updated 6 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆180Updated 8 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- Enumerate active EDR's on the system☆148Updated 3 months ago
- Microsoft Network Service Fingerprinting Tool☆60Updated 2 weeks ago
- PoC that downloads an executable from a public SSL certificate☆135Updated 5 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆214Updated 2 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆62Updated this week
- ☆86Updated 8 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆101Updated 8 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 4 months ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆131Updated 4 months ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆147Updated last month
- Permanently disable EDRs as local admin☆124Updated last month
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆122Updated 7 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated last year
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆250Updated last week
- Inject RDPThief into memory with PowerShell.☆65Updated 11 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆77Updated last year
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆95Updated last month