└── Offensive.md /Offensive.md: -------------------------------------------------------------------------------- 1 | # Bug Bounty, Pentest, Blue Team Part.1 2 | 3 | 4 | 5 | 6 | willian9 7 | 8 | 9 | 10 | willian9 11 | 12 | 13 | 14 | - [Reconnaissance/Discovery](#reconnaissancediscovery) 15 | - [Initial Access](#initial-access) 16 | - [Execution](#execution) 17 | - [Persistence](#persistence) 18 | - [Privilege Escalation](#privilege-escalation) 19 | - [Defense Evasion](#defense-evasion) 20 | - [Credential Access](#credential-access) 21 | - [Lateral Movement](#lateral-movement) 22 | - [Collection](#collection) 23 | - [Command & Control](#command--control) 24 | - [Exfiltration](#exfiltration) 25 | 26 | ## Reconnaissance/Discovery 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | 161 | 162 | 163 | 164 | 165 | 166 | 167 | 168 | 169 | 170 | 171 | 172 | 173 | 174 | 175 | 176 | 177 | 179 | 180 | 181 | 182 | 183 | 184 | 185 | 186 | 187 | 188 | 189 | 190 | 191 | 192 | 193 | 194 | 195 | 196 | 197 | 198 | 199 | 200 |
LinkDescription
asaurusrex/Probatorum-EDR-Userland-Hook-Checker 35 | Project to check which Nt/Zw functions your local EDR is hooking
boku7/whereamiCobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL's.
chdav/SharpCGHunterReceive the status of Windows Defender Credential Guard on network hosts.
codingo/ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
cube0x0/LdapSignCheckBeacon Object File & C# project to check LDAP signing
dev-2null/ADCollectorA lightweight tool to quickly extract valuable information from the Active Directory environment for both 56 | attacking and defending.
dirkjanm/ROADtoolsThe Azure AD exploration framework.
djhohnstein/SharpSearchSearch files for extensions as well as text within.
djhohnstein/SharpSharesEnumerate all network shares in the current domain. Also, can resolve names to IP addresses.
dsnezhkov/TruffleSnoutIterative AD discovery toolkit for offensive operations
EspressoCake/Process_Protection_Level_BOFA Syscall-only BOF file intended to grab process protection attributes, limited to a handful that Red Team operators and pentesters would commonly be interested in.
fashionproof/CheckSafeBootI used this to see if an EDR is running in Safe Mode
FourCoreLabs/EDRHuntScan installed EDRs and AVs on Windows
GhostPack/SeatbeltSeatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant 89 | from both offensive and defensive security perspectives.
jaredhaight/scoutA .NET assembly for performing recon against hosts on a network
klezVirus/SharpLdapRelayScanC# Port of LdapRelayScan
lkarlslund/adalancheActive Directory ACL Visualizer - who's really Domain Admin?
mdsecactivebreach/sitrepSitRep is intended to provide a lightweight, extensible host triage alternative.
mez-0/SharpShares.NET 4.0 Share Hunting and ACL Mapping
Mr-Un1k0d3r/ADHuntToolofficial repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)
nccgroup/CarnivoreTool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb
NetSPI/goddigoddi (go dump domain info) dumps Active Directory domain information
optiv/Registry-ReconCobalt Strike Aggressor Script that Performs System/AV/EDR Recon
outflanknl/Recon-ADRecon-AD, an AD recon tool based on ADSI and reflective DLL’s
p0dalirius/LDAPmonitorMonitor creation, deletion and changes to LDAP objects live during your pentest or system administration!
rasta-mouse/WatsonEnumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilitiesEnumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
rvrsh3ll/SharpPrinterDiscover Printers
s0lst1c3/SharpFinderDescription: Searches for files matching specific criteria on readable shares within the domain.
S3cur3Th1sSh1t/Invoke-SharpcradleLoad C# Code from a Webserver straight to memory and execute it there.
sophoslabs/metasploit_gather_exchangeMetasploit Post-Exploitation Gather module for Exchange Server
stufus/reconeratorC# Targeted Attack Reconnissance Tools
sud0woodo/DCOMradePowershell script for enumerating vulnerable DCOM Applications
T0pCyber/hawkPowershell Based tool for gathering information related to O365 intrusions and potential Breaches
tasox/LogRMLogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network
tevora-threat/SharpViewC# implementation of harmj0y's PowerView
TonyPhipps/MeerkatA collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based 178 | endpoints.
tomcarver16/ADSearchA tool to help query AD via the LDAP protocol
vletoux/SpoolerScannerCheck if MS-RPRN is remotely available with powershell/c#
yogeshojha/renginereNgine is a reconnaissance engine(framework) that does end-to-end reconnaissance with the help of highly configurable scan engines and does information gathering about the target web application. reNgine makes use of various open-source tools and makes a configurable pipeline of reconnaissance.
ZeroPointSecurity/Domain-Enumeration-ToolPerform Windows domain enumeration via LDAP
zyn3rgy/LdapRelayScanCheck for LDAP protections regarding the relay of NTLM authentication
201 | 202 | ## Initial Access 203 | 204 | 205 | 206 | 207 | 208 | 209 | 210 | 211 | 212 | 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 |
LinkDescription
BeetleChunks/SpoolSploitA collection of Windows print spooler exploits containerized with other utilities for practical exploitation.
mgeeky/PackMyPayloadhttps://github.com/mgeeky/PackMyPayload
shelld3v/PwnVPNThe best exploitation tool for SSL VPN 0day vulnerabilities
222 | 223 | ## Execution 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | 235 | 236 | 237 | 238 | 239 | 240 | 241 | 242 | 243 | 244 | 245 | 246 | 247 | 248 | 249 | 250 | 251 | 252 | 253 | 254 | 255 | 256 | 257 | 258 | 259 | 260 | 261 | 262 | 263 | 264 | 265 | 266 | 267 | 268 | 269 | 270 | 271 | 272 | 273 | 274 | 275 | 276 | 277 | 278 | 279 | 280 | 281 | 282 | 283 | 284 | 285 | 286 | 287 | 288 | 290 | 291 | 292 | 293 | 294 | 295 | 296 | 297 | 298 | 299 | 300 | 301 | 302 | 303 | 304 | 305 | 306 | 307 | 308 | 309 | 310 | 311 | 312 | 313 | 314 | 315 | 316 | 317 | 318 | 319 | 320 | 321 | 322 | 323 | 324 | 325 | 326 | 327 | 328 | 329 | 330 | 331 | 332 | 333 | 334 | 335 | 336 | 337 | 338 | 339 | 340 | 341 | 342 | 343 | 344 | 345 | 346 | 347 | 348 | 349 | 350 | 351 | 352 | 353 | 354 | 355 | 356 | 357 | 358 | 359 | 360 | 361 | 362 | 363 | 364 | 365 | 366 | 367 | 368 | 369 | 370 | 371 | 372 | 373 | 374 | 375 | 376 | 377 | 378 | 379 | 380 | 381 | 382 | 383 | 384 | 385 | 386 | 387 | 388 | 389 | 390 | 391 | 392 | 393 | 394 | 395 | 396 | 397 | 398 | 399 | 400 | 401 | 402 | 403 | 404 | 405 | 406 | 407 | 408 | 409 | 410 | 411 | 412 | 413 | 414 | 415 | 416 | 417 | 418 | 419 | 420 | 421 | 422 | 423 | 424 | 425 | 426 | 427 | 428 | 429 | 430 | 431 | 432 | 433 | 434 | 435 | 436 | 437 | 438 | 439 | 440 | 441 | 442 | 443 | 444 | 445 | 446 | 447 | 448 | 449 | 450 | 451 | 452 | 453 | 454 | 455 | 456 | 457 | 458 | 459 | 460 | 461 | 462 | 463 | 464 | 465 | 466 | 467 | 468 | 469 | 470 | 471 | 472 | 473 | 474 | 475 | 476 | 477 | 478 | 479 | 480 | 481 | 482 | 483 | 484 | 485 | 486 | 487 | 488 | 489 | 490 | 491 | 492 | 493 | 494 | 495 | 496 | 497 | 498 | 499 | 500 | 501 | 502 | 503 | 504 | 505 | 506 | 507 | 508 | 509 | 510 | 511 | 512 | 513 | 514 | 515 | 516 | 517 | 518 | 519 | 520 | 521 | 522 | 523 | 524 | 525 | 526 | 527 | 528 | 529 | 530 | 531 | 532 | 533 | 534 | 535 | 536 | 537 | 538 | 539 | 540 | 541 | 542 | 543 | 544 | 545 | 546 | 547 | 548 | 549 | 550 | 551 | 552 | 553 | 555 | 556 | 557 | 558 | 559 | 560 | 561 | 562 | 563 | 564 | 565 | 566 | 567 | 568 | 569 | 570 | 571 | 572 | 573 | 574 | 576 | 577 | 578 | 579 | 580 | 581 | 582 | 583 | 584 | 585 | 586 | 587 | 588 | 589 | 590 | 591 | 592 | 593 | 594 | 595 | 596 | 597 | 598 | 599 | 600 | 601 | 602 | 603 | 604 | 605 | 606 | 607 | 608 | 609 | 610 | 611 | 612 | 613 | 614 | 615 | 616 | 617 | 618 | 619 | 620 | 621 | 622 | 623 | 624 | 625 | 626 | 627 | 628 | 629 | 630 | 631 | 632 | 633 | 634 | 635 | 636 | 637 | 638 | 639 | 640 | 641 | 642 | 643 | 645 | 646 | 647 | 648 | 649 | 650 | 651 | 652 | 653 | 654 | 655 | 656 | 657 | 658 | 659 | 660 | 661 | 662 | 663 | 664 | 665 | 666 | 667 | 668 | 669 | 670 | 671 | 672 | 673 | 674 | 675 | 676 | 677 | 678 | 679 | 680 | 681 | 682 | 683 | 684 | 685 | 686 | 687 | 688 | 689 | 690 | 691 | 692 | 695 | 696 | 697 | 698 | 699 | 700 | 701 | 702 | 703 | 704 | 705 | 706 | 707 | 708 | 709 | 710 | 711 | 712 | 713 | 714 | 715 | 716 | 717 | 718 | 719 | 720 | 721 | 722 | 723 | 724 | 725 | 726 | 728 | 729 | 730 | 731 | 732 | 733 | 734 | 735 | 736 | 737 | 738 | 739 | 740 | 741 | 742 | 743 | 744 | 745 | 746 | 747 | 748 | 749 | 750 | 751 | 752 | 753 | 754 | 755 | 757 | 758 | 759 | 760 | 761 | 762 | 763 | 764 | 765 | 766 | 767 | 768 | 769 | 770 | 771 | 772 | 775 | 776 | 777 | 778 | 779 | 780 | 781 | 782 | 783 | 784 | 785 | 786 | 787 | 788 | 789 | 790 | 791 | 792 | 793 | 794 | 795 | 796 | 797 | 798 | 799 | 800 | 801 | 802 | 803 | 804 | 805 | 806 | 807 | 808 | 809 | 810 | 811 | 812 | 813 | 814 | 815 | 816 |
LinkDescription
0xsp-SRD/OffensivePascalPascal Offsec repo for malware dev and red teaming 🚩
Accenture/CLRvoyanceManaged assembly shellcode generation
aeverj/NimShellCodeLoaderNim编写Windows平台shellcode免杀加载器
airbus-cert/Invoke-BOFLoad any Beacon Object File using Powershell!
ajpc500/NimlineWhispersA very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.
Akaion/BleakA Windows native DLL injection library that supports several methods of injection.
Allevon412/TeamsImplantThis project is a stealthy teams implant that proxies the urlmon.dll that teams uses compile and throw this bad boy in the teams directory as urlmon.dll and you got yourself a persistence backdoor whenever teams runs by a user or at startup.
antonioCoco/SharPyShellSharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications
api0cradle/LOLBASLiving Off The Land Binaries and Scripts (and now also Libraries)
ariary/fileless-xecStealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,...)
b1tg/rust-windows-shellcodeWindows shellcode development in Rust
bats3c/DarkLoadLibraryLoadLibrary for offensive operations
BC-SECURITY/EmpireEmpire is a PowerShell and Python post-exploitation agent.
BC-SECURITY/Offensive-VBA-and-XLS-EntanglementOffensive VBA and XLS Entanglement
Binject/backdoorfactoryA from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of 289 | binaries on the wire.
boku7/bof-spawnSuspendedProcessCobalt Strike Beacon Object File (BOF) that takes the name of of a PE file as an argument and spawns the process in a suspended state
bohops/GhostBuildGhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects
byt3bl33d3r/BOF-NimCobalt Strike BOF Files with Nim!
bytecode77/living-off-the-landFileless attack with persistence
ByteJunkies-co-uk/MetsubushiGenerate droppers with encrypted payloads automatically.
capt-meelo/BeaconatorA beacon generator using Cobalt Strike and PEzor.
cdong1012/Crab-RunnerShellcode runner in Rust
cedowens/Mythic-Macro-GeneratorPython3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens
ChaitanyaHaritash/Callback_Shellcode_InjectionPOCs for Shellcode Injection via Callbacks
Ch0pin/AVIatorAV|Ator is a backdoor generator utility, which uses cryptographic and injection techniques in order to bypass AV detection.
checkymander/Sharp-SMBExecSMBExec C# module
cobbr/SharpSploitSharpSploit is a .NET post-exploitation library written in C#
connormcgarr/LittleCorporalLittleCorporal: A C# Automated Maldoc Generator
Cn33liz/StarFightersA JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.
Cr4sh/KernelForgeA library to develop kernel level Windows payloads for post HVCI era
cribdragg3r/AlarisA protective and Low Level Shellcode Loader the defeats modern EDR systems.
cube0x0/SharpeningCobaltStrikeI realtime v35/40 dotnet compiler for your linux Cobalt Strike C2. New fresh compiled and obfuscated binary for each use
Cybellum/DoubleAgentDoubleAgent is a new Zero-Day technique for injecting code and maintaining persistence on a machine (i.e. auto-run).
cytopia/kusanagiKusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.
D00MFist/Go4aRunShellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process
damienvanrobaeys/PS1-To-EXE-GeneratorPS1 to EXE Generator: Create an EXE for your PS1 scripts
darkr4y/geaconPractice Go programming and implement CobaltStrike's Beacon in Go
D00MFist/MystikalmacOS Initial Access Payload Generator
dtrizna/easy-hollowAutomated build for process hollowing shellcode loader. Build on top of TikiTorch and donut projects.
EddieIvan01/memexecA library for loading and executing PE (Portable Executable) from memory without ever touching the disk
EntySec/HatVenomHatVenom is a HatSploit native powerful payload generation and shellcode injection tool that provides support for common platforms and architectures.
erikgeiser/govenomgovenom is a msfvenom-inspired cross-platform payload generator toolkit written in Go
EspressoCake/DLL-Hijack-Search-Order-BOFDLL Hijack Search Order Enumeration BOF
FalconForceTeam/BOF2shellcodePOC tool to convert CobaltStrike BOF files to raw shellcode
FatCyclone/D-PwnD/Invoke standalone shellcode runners
Flangvik/SharpCollectionNightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
forrest-orr/artifacts-kitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
FortyNorthSecurity/CIMplantC# port of WMImplant which uses either CIM or WMI to query remote systems
FortyNorthSecurity/EDDEnumerate Domain Data is designed to be similar to PowerView but in .NET. PowerView is essentially the ultimate domain enumeration tool, and we wanted a .NET implementation that we worked on ourselves. This tool was largely put together by viewing implementations of different functionality across a wide range of existing projects and combining them into EDD.
FortyNorthSecurity/EXCELntDonutExcel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.
FortyNorthSecurity/hot-manchegoMacro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.
frkngksl/HuanEncrypted PE Loader Generator
FuzzySecurity/PowerShell-SuiteThere are great tools and resources online to accomplish most any task in PowerShell, sometimes however, there is a need to script together a util for a specific purpose or to bridge an ontological gap. This is a collection of PowerShell utilities I put together either for fun or because I had a narrow application in mind.
gen0cide/gscriptframework to rapidly implement custom droppers for all three major operating systems
GetRektBoy724/MeterPwrShellAutomated Tool That Generate The Perfect Powershell Payload
GetRektBoy724/SharpHalosMy implementation of Halo's Gate technique in C#
GhostPack/SharpWMISharpWMI is a C# implementation of various WMI functionality.
gigajew/WinXRunPETwo C# RunPE's capable of x86 and x64 injections
glinares/InlineShapesPayloadVBA InlineShapes Payload Generator
gloxec/CrossC2Generate CobaltStrike's cross-platform payload
hausec/MaliciousClickOnceMSBuildBasic C# Project that will take an MSBuild payload and run it with MSBuild via ClickOnce.
hasherezade/masm_shcA helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.
JamesCooteUK/SharpSphere.NET Project for Attacking vCenter
jhalon/SharpCallSimple PoC demonstrating syscall execution in C#
jfmaes/Invoke-DLLCloneKoppeling x Metatwin x LazySign
jfmaes/SharpLNKGen-UIUI for creating LNKs
jfmaes/SharpZipRunnerExecutes position independent shellcode from an encrypted zip
JohnWoodman/VBA-Macro-ProjectsThis repository is a collection of my malicious VBA projects.
jonaslejon/malicious-pdfGenerate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator
kkent030315/anycallx64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration
knownsec/shellcodeloaderShellcodeLoader of windows can bypass AV.
Kudaes/DInvoke_rsDynamically invoke arbitrary unmanaged code.
kyleavery/ThirdEyeWeaponizing CLRvoyance for Post-Ex .NET Execution
lockedbyte/CVE-2021-40444Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution)
mai1zhi2/SharpBeaconCobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能
MarkoH17/Spray365Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to bypass Azure Smart Lockout and insecure conditional access policies.
maxlandon/wiregostGolang Implant & Post-Exploitation Framework
mdsecactivebreach/SharpShooterSharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code.
med0x2e/GadgetToJScriptA tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
memN0ps/RustSCRunnerShellcode Runner/Injector in Rust using NTDLL functions directly with the ntapi Library.
mgeeky/StracciatellaOpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and 554 | Script Block Logging disabled at startup
michaelweber/MacromeExcel Macro Document Reader/Writer for Red Teamers & Analysts
mkellerman/Invoke-CommandAsInvoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects.
mlcsec/SharpSQLSimple C# implementation of PowerUpSQL
mobdk/SigmaExecute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx
Mr-Un1k0d3r/RedTeamCSharpScriptsC# Script used for Red Team. These binaries can be used by Cobalt Strike execute-assembly or as standalone 575 | executable.
mrexodia/AppInitHookGlobal user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary process.
nccgroup/GTFOBLookupOffline command line lookup utility for GTFOBins
netititude/RunOFA tool to run object files, mainly beacon object files (BOF), in .Net.
nnsee/fileless-elf-execExecute ELF files without dropping them on disk
NVISOsecurity Marauders MapThe Marauders Map is meant to be used on assessments where you have gained GUI access to an enviornment. The Marauders Map is a DLL written in C#, enriched by the DllExport project to export functions that can serve as an entrypoint of invocation for unmanaged code such as rundll32.
NYAN-x-CAT/Csharp-LoaderDownload a .NET payload and run it on memory
optiv/IvyIvy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
p3nt4/RunDLL.NetExecute .Net assemblies using Rundll32.exe
plackyhacker/Sys-CallsAn example of using Syscalls in C# to get a meterpreter shell.
postrequest/xecaPowerShell payload generator
praetorian-inc/MatryoshkaMatryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.
Professor-plum/Reflective-Driver-LoaderReflective Kernel Driver injection is a injection technique base off Reflective DLL injection by Stephen Fewer.
pwn1sher/frostbyteFrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
pwn1sher/uuid-loaderUUID based shellcode loader for your favorite C2
shogunlab/MochiMochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.
rasta-mouse/MiscToolsMiscellaneous Tools
redcanaryco/chain-reactorChain Reactor is an open source framework for composing executables that simulate adversary behaviors and 644 | techniques on Linux endpoints.
redcode-labs/ColdfireGolang malware development library
redcode-labs/GoSHGolang reverse/bind shell generator
redcode-labs/NeuraxA framework for constructing self-spreading binaries
redcode-labs/REVENANTVolatile ELF payloads generator with Metasploit integrations for testing GNU/Linux ecosystems against low-level threats
redcode-labs/SNOWCRASHA polyglot payload generator
rek7/fireELFfireELF - Fileless Linux Malware Framework
Reverse Shell GeneratorReverse Shell Generator
richkmeli/RichkwareFramework for building Windows malware, written in C++
ropnop/go-sharp-loader.goExample Go program with multiple .NET Binaries embedded
rvrsh3ll/NoMSBuildMSBuild without MSbuild.exe
s0lst1c3/dropengineDropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and combine them to create highly sophisticated payloads within seconds.DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and combine them to create highly sophisticated payloads within seconds.DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and combine them to create highly sophisticated payloads within seconds.
sevagas/macro_packmacro_pack is a tool used to automatize obfuscation and generation of MS Office documents for pentest, demo, 693 | and social engineering assessments. The goal of macro_pack is to simplify antimalware bypass and automatize 694 | the process from vba generation to final Office document generation.
S3cur3Th1sSh1t/Invoke-SharpLoaderLoad encrypted and compressed C# Code from a remote Webserver or from a local file straight to memory and execute it there.
S3cur3Th1sSh1t/Nim_CBT_ShellcodeCallBack-Techniques for Shellcode execution ported to Nim
S3cur3Th1sSh1t/Nim-RunPEA Nim implementation of reflective PE-Loading from memory
S3cur3Th1sSh1t/OffensiveVBAThis repo covers some code execution and AV Evasion methods for Macros in Office documents
S4R1N/AlternativeShellcodeExecAlternative Shellcode Execution Via Callbacks
scythe-io/memory-module-loaderAn implementation of a Windows loader that can load dynamic-linked libraries (DLLs) directly from memory
secdev-01/AllTheThingsExecExecutes Blended Managed/Unmanged Exports
sh4hin/GoPurpleYet another shellcode runner consists of different techniques for evaluating detection capabilities of 727 | endpoint security solutions
SheLLVM/SheLLVMA collection of LLVM transform and analysis passes to write shellcode in regular C
snovvcrash/NimHollowNim implementation of Process Hollowing using syscalls (for educational purposes)
snovvcrash/peasModified version of PEAS client for offensive operations
STMSolutions/boobsnailBoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.
timwhitez/Doge-Loader🐶Cobalt Strike Shellcode Loader by Golang
TheCruZ/kdmapperKDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memory
TheWover/donutGenerates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and 756 | other Windows payloads from memory and runs them with parameters
threatexpress/cobaltstrike_payload_generatorQuickly generate every payload type for each listener and optionally host via HTTP.
trickster0/OffensiveRustRust Weaponization for Red Team Engagements.
trustedsec/ELFLoaderThis is a ELF object in memory loader/runner. The goal is to create a single elf loader that can be used to run follow on capabilities across all x86_64 and x86 nix operating systems.
trustedsec/unicornUnicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. 773 | Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy 774 | (TrustedSec) and Josh Kelly at Defcon 18.
wumb0/rust_bofCobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.
X-C3LL/xlsxPoisoNJust a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)
xforcered/InlineExecute-AssemblyInlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module
xinbailu/DripLoaderEvasive shellcode loader for bypassing event-based injection detection (PoC)
xinbailu/DripLoader-Opsa usable, cleaned-up version for script kiddies
xpn/NautilusProjectA collection of weird ways to execute unmanaged code in .NET
V1V1/OffensiveAutoItOffensive tooling notes and experiments in AutoIt v3
Yaxser/COFFLoader2Load and execute COFF files and Cobalt Strike BOFs in-memory
yqcs/ZheTianZheTian Powerful remote load and execute ShellCode tool
zerosum0x0/rcmdRuns a command in another process
817 | 818 | ## Persistence 819 | 820 | 821 | 822 | 823 | 824 | 825 | 826 | 827 | 828 | 829 | 830 | 831 | 832 | 833 | 834 | 835 | 836 | 837 | 838 | 839 | 840 | 841 | 842 | 843 | 844 | 845 | 846 | 847 | 848 | 849 | 850 | 851 | 852 | 853 | 854 | 855 | 856 | 857 | 858 | 859 | 860 | 861 | 862 | 863 | 864 | 865 | 866 | 867 | 868 | 869 | 870 | 871 | 872 | 873 | 874 | 875 | 876 | 877 | 878 | 879 | 880 | 881 | 882 | 883 | 884 | 885 | 886 | 887 | 888 | 889 | 890 | 891 | 892 | 893 |
LinkDescription
0xthirteen/SharpStay.NET project for installing Persistence
360-Linton-Lab/TelemetryTELEMETRY is a C# For Windows PERSISTENCE
airzero24/PortMonitorPersistPoC for Port Monitor Persistence
ben0xa/doucmeThis leverages the NetUserAdd Win32 API to create a new computer account. This is done by setting the usri1_priv of the USER_INFO_1 type to 0x1000. The primary goal is to avoid the normal detection of new user created events (4720).
CyborgSecurity/PoisonAppleCommand-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters for cyber threat emulation purposes.
djhohnstein/SharpSCSimple .NET assembly to interact with services.
fireeye/SharPersistWindows persistence toolkit written in C#.
IcebreakerSecurity/PersisBOFA tool to help automate common persistence mechanisms. Currently supports Print Monitor (SYSTEM), Time Provider (Network Service), Start folder shortcut hijacking (User), and Junction Folder (User)
netero1010/ScheduleRunnerA C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation
NtQuerySystemInformation/CustomKeyboardLayoutPersistenceAchieve execution using a custom keyboard layout
o1mate/DLLProxAutomatic DLL comment link generation and explaination of the DLL Proxying techniques
panagioto/SyscallHideCreate a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.
RedSection/printjackerHijack Printconfig.dll to execute shellcode
S4R1N/ZoomPersistenceZoom Persistence Aggressor and Handler
slaeryan/MIDNIGHTTRAINCovert Stage-3 Persistence Framework
vivami/OutlookParasiteOutlook persistence using VSTO add-ins
wgpsec/CreateHiddenAccountA tool for creating hidden accounts using the registry.
894 | 895 | ## Privilege Escalation 896 | 897 | 898 | 899 | 900 | 901 | 902 | 903 | 904 | 905 | 906 | 907 | 908 | 909 | 910 | 911 | 912 | 913 | 914 | 915 | 916 | 917 | 918 | 919 | 920 | 921 | 922 | 923 | 925 | 926 | 927 | 928 | 929 | 930 | 931 | 932 | 933 | 934 | 935 | 936 | 937 | 938 | 939 | 940 | 941 | 942 | 943 | 944 | 945 | 946 | 947 | 948 | 949 | 950 | 951 | 952 | 953 | 954 | 955 | 956 | 957 | 958 | 959 | 960 | 961 | 962 | 963 | 964 | 965 | 966 | 967 | 968 | 969 | 970 | 971 | 972 | 973 | 974 | 975 | 976 | 977 | 978 | 979 | 980 | 981 | 982 | 983 | 984 | 985 | 986 | 987 | 988 | 989 | 990 | 991 | 992 | 993 | 994 | 995 | 996 | 997 | 998 | 999 | 1000 | 1001 | 1002 | 1003 | 1004 | 1005 | 1006 | 1007 | 1008 | 1009 | 1010 | 1011 | 1012 | 1013 | 1014 | 1015 | 1016 | 1017 | 1018 | 1019 | 1020 | 1021 | 1022 | 1023 | 1024 | 1025 | 1026 | 1027 | 1028 | 1029 | 1030 | 1031 | 1032 | 1033 | 1034 | 1035 | 1036 | 1037 | 1038 | 1039 | 1040 | 1041 | 1042 | 1043 | 1044 | 1045 | 1046 | 1047 |
LinkDescription
0xbadjuju/TokenvatorA tool to elevate privilege with Windows Tokens
411Hall/JAWSJAWS is PowerShell script designed to help penetration testers (and CTFers) quickly identify potential privilege escalation vectors on Windows systems. It is written using PowerShell 2.0 so 'should' run on every Windows version since Windows 7.
antonioCoco/RemotePotato0Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin.
antonioCoco/RogueWinRMWindows Local Privilege Escalation from Service Account to System
antonioCoco/RunasCsRunasCs - Csharp and open version of windows builtin runas.exe
carlospolop/privilege-escalation-awesome-scripts-suite 924 | PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
CCob/SweetPotatoLocal Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
CMatri/GotatoGeneric impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.
CravateRouge/bloodyADBloodyAD is an Active Directory Privilege Escalation Framework
DarkCoderSc/PowerRunAsSystemRun application as system with interactive system process support (active Windows session)
Dec0ne/KrbRelayUpKrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
eladshamir/WhiskerWhisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
eloypgz/certiUtility to play with ADCS, allows to request tickets and collect information about related objects. Basically, it's the impacket copy of Certify. Thanks to @harmj0y and @tifkin_ for its great work with ADCS.
EspressoCake/Toggle_Token_Privileges_BOFSyscall BOF to arbitrarily add/detract process token privilege rights.
GhostPack/CertifyActive Directory certificate abuse.
GhostPack/ForgeCertForgeCert uses the BouncyCastle C# API and a stolen Certificate Authority (CA) certificate + private key to forge certificates for arbitrary users capable of authentication to Active Directory.
GoSecure/WSuspiciousWSuspicious - A tool to abuse insecure WSUS connections for privilege escalationsWSuspicious - A tool to abuse insecure WSUS connections for privilege escalations
gtworek/Priv2AdminExploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
hlldz/dazzleUPA tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems.
itm4n/PrivescCheckPrivilege Escalation Enumeration Script for Windows
itm4n/UsoDllLoaderWindows - Weaponizing privileged file writes with the Update Session Orchestrator service
jacob-baines/concealed_positionBring your own print driver privilege escalation tool
liamg/traitorAutomatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins
mpgn/BackupOperatorToDAFrom an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller
nccgroup/ncssfas - SpoolSystemSpoolSystem is a CNA script for Cobalt Strike which uses the Print Spooler named pipe impersonation trick to gain SYSTEM privileges.
ollypwn/CertipyPython implementation for Active Directory certificate abuse
ricardojba/Invoke-noPacPowerSharpPack style .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploiter noPac.
rxwx/spoolsystemPrint Spooler Named Pipe Impersonation for Cobalt Strike
sailay1996/delete2SYSTEMWeaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM
S3cur3Th1sSh1t/MultiPotatoMultiPotato
S3cur3Th1sSh1t/SharpImpersonationA User Impersonation tool - via Token or Shellcode injection
ShutdownRepo/ShadowCoerceMS-FSRVP coercion abuse PoC
slyd0g/PrimaryTokenTheftSteal a primary token and spawn cmd.exe using the stolen token
TsukiCTF/Lovely-PotatoAutomating juicy potato local privilege escalation exploit for penetration testers.
thehappydinoa/rootOSmacOS Privilege Escalation Helper
WazeHell/sam-the-adminExploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
1048 | 1049 | ## Defense Evasion 1050 | 1051 | 1052 | 1053 | 1054 | 1055 | 1056 | 1057 | 1058 | 1059 | 1060 | 1061 | 1062 | 1063 | 1064 | 1065 | 1066 | 1067 | 1068 | 1069 | 1070 | 1071 | 1072 | 1073 | 1074 | 1075 | 1076 | 1077 | 1078 | 1081 | 1082 | 1083 | 1084 | 1085 | 1086 | 1087 | 1088 | 1089 | 1090 | 1091 | 1092 | 1093 | 1094 | 1095 | 1096 | 1097 | 1098 | 1099 | 1100 | 1101 | 1102 | 1103 | 1104 | 1105 | 1106 | 1107 | 1109 | 1110 | 1111 | 1112 | 1113 | 1114 | 1115 | 1116 | 1117 | 1118 | 1119 | 1120 | 1121 | 1122 | 1123 | 1124 | 1125 | 1126 | 1127 | 1128 | 1129 | 1130 | 1131 | 1132 | 1133 | 1134 | 1135 | 1136 | 1137 | 1138 | 1139 | 1140 | 1141 | 1142 | 1143 | 1144 | 1145 | 1146 | 1147 | 1148 | 1149 | 1150 | 1151 | 1152 | 1153 | 1154 | 1155 | 1156 | 1157 | 1158 | 1159 | 1160 | 1161 | 1162 | 1163 | 1164 | 1165 | 1166 | 1167 | 1168 | 1169 | 1170 | 1171 | 1172 | 1173 | 1174 | 1175 | 1176 | 1177 | 1178 | 1179 | 1180 | 1181 | 1182 | 1183 | 1184 | 1185 | 1186 | 1187 | 1188 | 1189 | 1190 | 1191 | 1192 | 1193 | 1194 | 1195 | 1196 | 1197 | 1198 | 1199 | 1200 | 1201 | 1202 | 1203 | 1204 | 1205 | 1206 | 1207 | 1208 | 1209 | 1210 | 1211 | 1212 | 1213 | 1214 | 1215 | 1216 | 1217 | 1218 | 1219 | 1220 | 1221 | 1222 | 1223 | 1224 | 1225 | 1226 | 1227 | 1228 | 1229 | 1230 | 1231 | 1232 | 1233 | 1234 | 1235 | 1236 | 1237 | 1238 | 1239 | 1240 | 1241 | 1242 | 1243 | 1244 | 1245 | 1246 | 1247 | 1248 | 1249 | 1250 | 1251 | 1252 | 1253 | 1254 | 1255 | 1256 | 1257 | 1258 | 1259 | 1260 | 1261 | 1262 | 1263 | 1264 | 1265 | 1266 | 1267 | 1268 | 1269 | 1270 | 1271 | 1272 | 1273 | 1274 | 1275 | 1276 | 1277 | 1278 | 1279 | 1280 | 1281 | 1282 | 1283 | 1284 | 1285 | 1286 | 1287 | 1288 | 1289 | 1290 | 1291 | 1292 | 1293 | 1294 | 1295 | 1296 | 1297 | 1298 | 1299 | 1300 | 1301 | 1302 | 1303 | 1304 | 1305 | 1306 | 1307 | 1308 | 1310 | 1311 | 1312 | 1313 | 1314 | 1315 | 1316 | 1317 | 1318 | 1319 | 1320 | 1321 | 1322 | 1323 | 1324 | 1325 | 1326 | 1327 | 1328 | 1329 | 1330 | 1331 | 1332 | 1333 | 1334 | 1336 | 1337 | 1338 | 1339 | 1340 | 1341 | 1342 | 1343 | 1344 | 1345 | 1346 | 1347 | 1348 | 1349 | 1350 | 1351 | 1352 | 1353 | 1354 | 1355 | 1356 | 1357 | 1358 | 1359 | 1360 | 1361 | 1362 | 1363 | 1364 | 1365 | 1366 | 1367 | 1368 | 1369 | 1370 | 1371 | 1372 | 1373 | 1374 | 1375 | 1376 | 1377 | 1378 | 1379 | 1380 | 1381 | 1382 | 1383 | 1384 | 1385 | 1386 | 1387 | 1388 | 1389 | 1390 | 1391 | 1392 | 1393 | 1394 | 1395 | 1396 | 1397 | 1398 | 1399 | 1400 | 1401 | 1402 | 1403 | 1404 | 1405 | 1406 | 1407 | 1408 | 1409 | 1410 | 1411 | 1412 | 1413 | 1414 | 1415 | 1416 | 1417 | 1418 | 1419 | 1420 | 1421 | 1422 | 1423 | 1424 | 1425 | 1426 | 1427 | 1428 | 1429 | 1430 | 1431 | 1432 | 1433 | 1434 | 1435 | 1436 | 1437 | 1438 | 1439 | 1440 | 1441 | 1442 | 1443 | 1444 | 1445 | 1446 | 1447 | 1448 | 1449 | 1450 | 1451 | 1452 | 1453 | 1454 | 1455 | 1456 | 1457 | 1458 | 1459 | 1460 | 1461 | 1462 | 1463 | 1464 | 1465 | 1466 | 1467 | 1468 | 1469 | 1470 | 1471 | 1472 | 1473 | 1474 | 1475 | 1476 | 1477 | 1478 | 1479 | 1480 | 1481 | 1482 | 1483 | 1484 | 1485 | 1486 | 1487 | 1488 | 1489 | 1490 | 1491 | 1492 | 1493 | 1494 | 1495 | 1496 | 1497 | 1498 | 1499 | 1500 | 1501 | 1502 | 1503 | 1504 | 1505 | 1506 | 1507 | 1508 | 1509 | 1510 | 1511 | 1512 | 1513 | 1514 | 1515 | 1516 | 1517 | 1518 | 1519 | 1520 | 1521 | 1522 | 1523 | 1524 | 1525 | 1526 | 1527 | 1528 | 1529 | 1530 | 1531 | 1532 | 1533 | 1534 | 1535 | 1536 | 1537 | 1538 | 1539 | 1540 | 1541 | 1542 | 1543 | 1544 | 1545 | 1546 | 1547 | 1548 | 1549 | 1550 | 1551 | 1552 | 1553 | 1554 | 1555 | 1556 | 1557 | 1558 | 1559 | 1560 | 1561 | 1562 | 1563 | 1564 | 1565 | 1566 | 1567 | 1568 | 1569 | 1570 | 1571 | 1572 | 1573 | 1574 | 1575 | 1576 | 1577 | 1578 | 1579 | 1580 | 1581 | 1582 | 1583 | 1584 | 1585 | 1586 | 1587 | 1588 | 1589 | 1590 | 1591 | 1592 | 1593 | 1594 | 1595 | 1596 | 1597 | 1598 | 1599 | 1600 | 1601 | 1602 | 1603 | 1604 | 1605 | 1606 | 1607 | 1608 | 1609 | 1610 | 1611 | 1612 | 1613 | 1614 | 1615 | 1616 | 1617 | 1618 | 1619 | 1620 | 1621 | 1622 | 1623 | 1624 | 1625 | 1626 | 1627 | 1628 | 1629 | 1630 | 1631 | 1632 | 1633 | 1634 | 1635 | 1636 | 1637 | 1638 | 1639 | 1640 | 1641 | 1642 | 1643 | 1644 | 1645 | 1646 | 1647 | 1648 | 1649 | 1650 | 1651 | 1652 | 1653 | 1654 | 1655 | 1656 | 1657 | 1658 | 1659 | 1660 | 1661 | 1662 | 1663 | 1664 | 1665 | 1666 | 1667 | 1668 | 1669 | 1670 | 1671 | 1672 | 1673 | 1674 | 1675 | 1676 | 1677 | 1678 | 1679 | 1680 | 1681 | 1682 | 1683 | 1684 | 1685 | 1686 | 1687 | 1688 | 1689 | 1690 | 1691 | 1692 | 1693 | 1694 | 1695 | 1696 | 1697 | 1698 | 1699 | 1700 | 1701 | 1702 | 1703 | 1704 | 1705 | 1706 | 1707 | 1708 | 1709 | 1710 | 1711 | 1712 | 1713 | 1714 | 1715 | 1716 | 1717 | 1718 | 1719 | 1720 | 1721 | 1722 | 1723 | 1724 | 1725 | 1726 | 1727 | 1728 | 1729 | 1730 | 1731 | 1732 | 1733 | 1734 | 1735 | 1736 | 1737 | 1738 | 1739 | 1740 | 1741 | 1742 | 1743 | 1744 | 1745 | 1746 | 1747 | 1748 | 1749 | 1750 | 1751 | 1752 | 1753 | 1754 | 1755 | 1756 | 1757 | 1758 | 1759 | 1760 | 1761 | 1762 | 1763 | 1764 | 1765 | 1766 | 1767 | 1768 | 1769 | 1770 | 1771 | 1772 | 1773 | 1774 | 1775 | 1776 | 1777 | 1778 | 1779 | 1780 | 1781 | 1782 | 1783 | 1784 | 1785 | 1786 | 1787 | 1788 | 1789 | 1790 | 1791 | 1792 | 1793 | 1794 | 1795 | 1796 | 1797 | 1798 | 1799 | 1800 | 1801 | 1802 | 1803 | 1804 | 1805 | 1806 | 1807 | 1808 | 1809 | 1810 | 1811 | 1812 | 1813 | 1814 | 1815 | 1816 | 1817 | 1818 | 1819 | 1820 | 1821 | 1822 | 1823 | 1824 | 1825 | 1826 | 1827 | 1828 | 1829 | 1830 | 1831 | 1832 | 1833 | 1834 | 1835 | 1836 | 1837 | 1838 | 1839 | 1840 | 1841 | 1842 | 1843 | 1844 | 1845 | 1846 | 1847 | 1848 | 1849 | 1850 | 1851 | 1852 | 1853 | 1854 | 1855 | 1856 | 1857 | 1858 | 1859 | 1861 | 1862 | 1863 | 1864 | 1865 | 1866 | 1867 | 1868 | 1869 | 1870 | 1871 | 1872 | 1873 | 1874 | 1875 | 1876 | 1877 | 1878 | 1879 | 1880 | 1881 | 1882 | 1883 | 1884 | 1885 | 1886 | 1887 | 1888 | 1889 | 1890 | 1891 | 1892 | 1893 | 1894 | 1895 | 1896 | 1897 | 1898 | 1899 | 1900 | 1901 | 1902 | 1903 | 1904 | 1905 | 1906 | 1907 | 1908 | 1909 | 1910 | 1911 | 1912 | 1913 | 1914 | 1915 | 1916 | 1917 | 1918 |
LinkDescription
0xDivyanshu/InjectorComplete Arsenal of Memory injection and other techniques for red-teaming in Windows
0xpat/COFFInjectorPoC MSVC COFF Object file loader/injector.
0xN3utr0n/NotemeELF packer/crypter that aims to create hardened and stealthy troyans
0xZDH/redirect.rulesQuick and dirty dynamic redirect.rules generator
3gstudent/Eventlogedit-evtx--EvolutionRemove individual lines from Windows XML Event Log (EVTX) files
89luca89/pakkeroPakkero is a binary packer written in Go made for fun and educational purpose. Its main goal is to take in 1079 | input a program file (elf binary, script, even appimage) and compress it, protect it from tampering and 1080 | intrusion.
aaaddress1/wowGrailPoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)
Aetsu/OffensivePipelineOffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.
airzero24/WMIRegPoC to interact with local/remote registry hives through WMI
ajpc500/NimlineWhispers2A tool for converting SysWhispers2 syscalls for use with Nim projects
AnErrupTion/LoGiC.NETA more advanced free and open .NET obfuscator using dnlib.
anthemtotheego/Detect-HooksProof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR
api0cradle/UltimateAppLockerByPassList 1108 | The goal of this repository is to document the most common techniques to bypass AppLocker.
arget13/DDexecA technique to run binaries filelessly and stealthily on Linux using dd to replace the shell with another process.
Arvanaghi/CheckPleaseSandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.
asaurusrex/DoppelGateThis project is designed to provide a method of extracting syscalls dynamically directly from on-disk ntdll. Userland hooks have become prevalent in many security products these days, and bypassing these hooks is a great way for red teamers/pentesters to bypass these defenses.
asaurusrex/EDR_Userland_Hook_CheckerProject to check which Nt/Zw functions your local EDR is hooking
audibleblink/dummyDLLUtility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
aus/gopherheavenGo implementation of the Heaven's Gate technique
AzAgarampur/byeintegrity4-uacBypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
AzAgarampur/byeintegrity8-uacBypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Bashfuscator/BashfuscatorA fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
bats3c/Ghost-In-The-LogsEvade sysmon and windows event logginEvade sysmon and windows event loggingg
BaumFX/cpp-anti-debuganti debugging library in c++.
BinaryScary/NET-ObfuscateObfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI
blacklanternsecurity/TREVORproxyA SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
bhumic/PErmutatorThe goal of this project is to create a permutation engine for PE files. The engine should randomize the executable parts of the file.
boku7/AsmHalosGatex64 Assembly HalosGate direct System Caller to evade EDR UserLand hooks
boku7/BokuLoaderCobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.
boku7/CobaltStrikeReflectiveLoaderCobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities.
boku7/halosgate-psCobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes
boku7/HellsGatePPIDAssembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process
boku7/HOLLOWEarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode
boku7/injectAmsiBypassCobalt Strike BOF - Bypass AMSI in a remote process with code injection.
boku7/injectEtwBypassCobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)
boku7/Ninja_UUID_DropperModule Stomping, No New Thread, HellsGate syscaller, UUID Dropper for x64 Windows 10!
boku7/spawnCobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.
bohops/UltimateWDACBypassListA centralized resource for previously documented WDAC bypass techniques
boku7/winx64-InjectAllProcessesMeterpreter-Shellcode64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.
br-sn/CheekyBlinderEnumerating and removing kernel callbacks using signed vulnerable drivers
burrowers/garbleObfuscate Go builds
bytecode77/self-morphing-csharp-binaryExecutable that mutates its own code
c0de90e7/GhostWritingGhostWriting Injection Technique.
calebstewart/bypass-clmPowerShell Constrained Language Mode Bypass
CCob/SharpBlockA method of bypassing EDR's active projection DLL's by preventing entry point execution.
Cerbersec/KillDefenderBOFBeacon Object File PoC implementation of KillDefender
ChadSki/SharpNeedleInject C# code into a running process
Charterino/AsStrongAsFuckA console obfuscator for .NET assemblies.
checkymander/ZolomC# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed
chvancooten/NimPackt-v1Nim-based assembly packer and shellcode loader for opsec & profit
Cn33liz/p0wnedShellp0wnedShell is an offensive PowerShell host application written in C# that does not rely on powershell.exe but runs powershell commands and functions within a powershell runspace environment (.NET)
cobbr/PSAmsiPSAmsi is a tool for auditing and defeating AMSI signatures.
cipheras/obfusCurated list of examples, tools, frameworks, etc in various languages with various techniques for obfuscation of RATs, malwares, etc. Only for learning purposes & red teaming.
cnsimo/BypassUACUse ICMLuaUtil to Bypass UAC!
Cracked5pider/KaynLdrKaynLdr is a Reflective Loader written in C/ASM
cube0x0/SyscallPackBOF and Shellcode for full DLL unhooking using dynamic syscalls
cwolff411/powerobAn on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.
cyberark/EvasorA tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
czs108/PE-Packer📦 A Windows x86 PE file packer written in C & Microsoft Assembly. The file after packing can obstruct the process of reverse engineering.
d00rt/ebfuscatorEbfuscator: Abusing system errors for binary obfuscation
d35ha/CallObfuscatorObfuscate specific windows apis with different apis
DamonMohammadbagher/NativePayload_TinjectionRemote Thread Injection by C#
danielbohannon/Invoke-CradleCrafter 1309 | PowerShell Remote Download Cradle Generator & Obfuscator
danielbohannon/Invoke-DOSfuscationCmd.exe Command Obfuscation Generator & Detection Test Harness
DarthTon/PolychaosPE permutation library
DarthTon/XenosWindows dll injector
dndx/phantunTransforms UDP stream into (fake) TCP streams that can go through Layer 3 & Layer 4 (NAPT) firewalls/NATs.
dsnezhkov/zombieantZombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
EgeBalci/Amberamber is a reflective PE packer for bypassing security products and mitigations. It can pack regularly 1335 | compiled PE files into reflective payloads that can load and execute itself like a shellcode.
EgeBalci/sgnShikata ga nai (仕方がない) encoder ported into go with several improvements
EspressoCake/Firewall_Walker_BOFA BOF to interact with COM objects associated with the Windows software firewall.
EspressoCake/Self_Deletion_BOFBOF implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs
FalconForceTeam/SysWhispers2BOFScript to use SysWhispers2 direct system calls from Cobalt Strike BOFs
FatRodzianko/SharpBypassUACC# tool for UAC bypasses
ffuf/pencodeComplex payload encoder
fireeye/OfficePurgeVBA purge your Office documents with OfficePurge. VBA purging removes P-code from module streams within Office documents.
Flangvik/AMSI.failC# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.
Flangvik/NetLoaderLoads any C# binary in mem, patching AMSI + ETW.
Flangvik/RosFuscatorYouTube/Livestream project for obfuscating C# source code using Roslyn
Flangvik/SharpDllProxyRetrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading
forrest-orr/phantom-dll-hollower-pocPhantom DLL hollowing PoC
GetRektBoy724/HalosUnhookerHalos Gate-based NTAPI Unhooker
GetRektBoy724/JALSIJALSI - Just Another Lame Shellcode Injector
GetRektBoy724/SharpUnhookerC# Based Universal API Unhooker
GetRektBoy724/TripleSSyscall Stub Stealer - Freshly steal Syscall stub straight from the disk
GetRektBoy724/TripleSSyscall Stub Stealer - Freshly steal Syscall stub straight from the disk
GhostPack/Invoke-EvasionPowerShell Obfuscation and Data Science
GoodstudyChina/APC-injection-x86-x64injdrv is a proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC.
HackOvert/AntiDBGA bunch of Windows anti-debugging tricks for x86 and x64.
hasherezade/module_overloadingA more stealthy variant of "DLL hollowing"
hasherezade/process_chameleonA process overwriting its own PEB to make an illusion that it has been loaded from a different path.
hasherezade/process_overwritingYet another variant of Process Hollowing
hasherezade/transacted_hollowingTransacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
hlldz/Invoke-Phant0mWindows Event Log Killer
hlldz/RefleXXionRefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtCreateSection, NtOpenSection and NtMapViewOfSection found in the LdrpThunkSignature array.
huntresslabs/evading-autorunsSlides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)
HuskyHacks/RustyProcessInjectorsJust some Rust process injector POCs, nothing weird.
icyguider/Nimcrypt2.NET, PE, & Raw Shellcode Packer/Loader Written in Nim
Idov32/FunctionStompingA new shellcode injection technique. Given as C++ header or standalone Rust program.
infosecn1nja/MaliciousMacroMSBuildGenerates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.
iomoath/PowerShxRun Powershell without software restrictions.
jason-klein/signed-nsis-exe-append-payloadAppend a custom data payload to a digitally signed NSIS .exe installer
jfmaes/LazySignCreate fake certs for binaries using windows binaries and the power of bat files
jfmaes/sharpbysentinelKill telemetry to sentinel
jfmaes/SharpNukeEventLognuke that event log using some epic dinvoke fu
JKornev/hiddenWindows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc
JoelGMSec/Invoke-StealthSimple & Powerful PowerShell Script Obfuscator
jonatan1024/clrinjectInjects C# EXE or DLL Assembly into every CLR runtime and AppDomain of another process.
jnastarot/furikuri(In dev)furikuri is framework for code protection
jthuraisamy/SysWhispersSysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls.
jthuraisamy/SysWhispers2AV/EDR evasion via direct system calls.
jthuraisamy/TelemetrySourcererEnumerate and disable common sources of telemetry used by AV/EDR.
JustasMasiulis/lazy_importerlibrary for importing functions from dlls in a hidden, reverse engineer unfriendly way
Kara-4search/FullDLLUnhooking_CSharpUnhook DLL via cleaning the DLL 's .text section
Kara-4search/HellgateLoader_CSharpLoad shelcode via HELLGATE, rewrite hellgate for learning purpose.
Kara-4search/MappingInjection_CSharpMappingInjection via csharp
karttoon/trigenTrigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.
kernelm0de/ProcessHiderHide Process From Task Manager using Usermode API Hooking
klezVirus/chameleonChameleon is yet another PowerShell obfuscation tool designed to bypass AMSI and commercial antivirus solutions.
klezVirus/inceptorTemplate-Driven AV/EDR Evasion Framework
klezVirus/SharpSelfDeleteC# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs
klezVirus/SysWhispers3SysWhispers on Steroids - AV/EDR evasion via direct system calls.
knight0x07/ImpulsiveDLLHijackC# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
kyleavery/inject-assemblyInject .NET assemblies into an existing process
l373/GIVINGSTORMInfection vector that bypasses AV, IDS, and IPS. (For now...)
last-byte/unDefenderKilling your preferred antimalware by abusing native symbolic links and NT paths.
lawiet47/STFUEDRSilence EDRs by removing kernel callbacks
m0rv4i/RidgwayA quick tool for hiding a new process running shellcode.
magnusstubman/dll-exportsCollection of DLL function export forwards for DLL export function proxying
maltek-labs/Malcode-ObfuscatorPolymorphic code obfuscator for use in Red Team operations
matterpreter/DefenderCheckIdentifies the bytes that Microsoft Defender flags on.
matterpreter/SHAPESHIFTERmatterpreter/SHAPESHIFTERCompanion PoC for the "Adventures in Dynamic Evasion" blog post
mdsecactivebreach/ChameleonChameleon: A tool for evading Proxy categorisation
mdsecactivebreach/firewalkerThis repo contains a simple library which can be used to add FireWalker hook bypass capabilities to existing code
med0x2e/NoAmciUsing DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().
med0x2e/SigFlipSigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature.
mgeeky/ElusiveMiceCobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
mgeeky/ShellcodeFluctuationAn in-memory evasion technique fluctuating shellcode memory protection between RW & RX and encrypting/decrypting contents
mgeeky/StracciatellaOpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup
mgeeky/ThreadStackSpooferThread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
MinervaLabsResearch/CoffeeShotCoffeeShot: Avoid Detection with Memory Injection
mobdk/UpsilonUpsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used
monoxgas/sRDIShellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
Moriarty2016/NimRDIRDI implementation in Nim
MRGEffitas/IronsquirrelEncrypted exploit delivery for the masses
nccgroup/demiguiseHTA encryption tool for RedTeams
netbiosX/AMSI-ProviderA fake AMSI Provider which can be used for persistence.
netero1010/TrustedPath-UACBypass-BOFCobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.exe" by using DCOM object.
nephosec/bof-adiosImplementation of Self Deleting Executables
nettitude/RunPEC# Reflective loader for unmanaged binaries.
NotPrab/.NET-ObfuscatorLists of .NET Obfuscator (Free, Trial, Paid and Open Source )
NtRaiseHardError/Anti-DeleteProtects deletion of files with a specified extension using a kernel-mode driver.
NtRaiseHardError/NINANINA: No Injection, No Allocation x64 Process Injection Technique
OmerYa/Invisi-ShellHide your Powershell script in plain sight. Bypass all Powershell security features
optiv/ScareCrowScareCrow - Payload creation framework designed around EDR bypass.
ORCA666/EVA3using hellsgate in EVA to get the syscalls
ORCA666/snaploaderInjecting shellcode into 'ntdll.dll' address space in target process, and hijacking its thread without calling GetThreadContext, evading memory scanners, and more ...
ORCA666/T.D.PUsing Thread Description To Hide Shellcode
OsandaMalith/PE2HTMLInjects HTML/PHP/ASP to the PE
outflanknl/TamperETWPoC to demonstrate how CLR ETW events can be tampered.
oXis/GPUSleepMove CS beacon to GPU memory when sleeping
passthehashbrowns/DInvokeProcessHollowingThis repository is an implementation of process hollowing shellcode injection using DInvoke from SharpSploit. DInvoke allows operators to use unmanaged code while avoiding suspicious imports or API hooking.
pathtofile/SealighterTICombining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider
peewpw/Invoke-PSImageEmbeds a PowerShell script in the pixels of a PNG file and generates a oneliner to execute
PELock/JObfuscator-PythonJObfuscator is a source code obfuscator for the Java language. Protect Java source code & algorithms from hacking, cracking, reverse engineering, decompilation & technology theft.
Pepitoh/VBadVBA Obfuscation Tools combined with an MS office document generator
phra/PEzorOpen-Source PE Packer
plackyhacker/Peruns-FartPerun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.
playhacker/SandboxDefenderC# code to Sandbox Defender (and most probably other AV/EDRs).
plackyhacker/SuspendedThreadInjectionAnother meterpreter injection technique using C# that attempts to bypass Defender
PwnDexter/SharpEDRCheckerChecks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, installed drivers and each drivers metadata, all for the presence of known defensive products such as AV's, EDR's and logging tools.
r3nhat/XORedReflectiveDLLReflective DLL Injection with obfuscated (XOR) shellcode
rasta-mouse/AmsiScanBufferBypassBypass AMSI by patching AmsiScanBuffer
RedCursorSecurityConsulting/PPLKillerTool to bypass LSA Protection (aka Protected Process Light)
reevesrs24/EvasiveProcessHollowingEvasive Process Hollowing Techniques
rmdavy/HeapsOfFunAMSI Bypass Via the Heap
RythmStick/AMSITriggerHunting for Malicious Strings
S1ckB0y1337/TokenPlayerManipulating and Abusing Windows Access Tokens.
S4R1N/MMFCodeInjectionCode Injection via Memory Mapped Files
sad0p/d0zerElf binary infector written in Golang
scrt/avdebuggerMost antivirus engines rely on strings or other bytes sequences, function exports and big integers to recognize malware. This project helps to automatically recover these signatures.
scrt/avcleanerC/C++ source obfuscator for antivirus bypass
secretsquirrel/SigThiefStealing Signatures and Making One Invalid Signature at a Time
SecIdiot/TitanLdrTitan: A crappy Reflective Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH
Sh0ckFR/InlineWhispers2Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
sinfulz/JustEvadeBroJustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.
slyd0g/SharpCrashEventLogC# port of LogServiceCrash
slyd0g/UrbanBishopLocalA port of FuzzySecurity's UrbanBishop project for inline shellcode execution. The execution vector uses a delegate vs an APC on a suspended threat at ntdll!RtlExitUserThread in UrbanBishop
SolomonSklash/SleepyCryptA shellcode function to encrypt a running process image when sleeping.
snovvcrash/DInjectorCollection of shellcode injection techniques packed in a D/Invoke weaponized DLL
stephenfewer/ReflectiveDLLInjectionReflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process
t3hbb/NSGenCSExtendable payload obfuscation and delivery framework
timwhitez/Doge-PX
timwhitez/Doge-sRDIShellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode
the-xentropy/xencryptA PowerShell script anti-virus evasion tool
TheWover/CertStealerA .NET tool for exporting and importing certificates without touching disk.
TheWover/GhostLoaderGhostLoader - AppDomainManager - Injection - 攻壳机动队
ThomasThelen/Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
tomcarver16/AmsiHookAmsiHook is a project I created to figure out a bypass to AMSI via function hooking.
tokyoneon/chimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial 1860 | antivirus solutions.
Tylous/LimelighterA tool for generating fake code signing certificates or signing real ones
Tylous/ZipExecA unique technique to execute binaries from a password protected zip
Unknow101/FuckThatPackerA simple python packer to easily bypass Windows Defender
VirtualAlllocEx/Payload-Download-CradlesThis are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.
VirtualAlllocEx/Shellcode-Downloader-CreateThread-ExecutionThis POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.
waldo-irc/YouMayPasserYouMayPasser is an x64 implementation of Gargoyle
Wra7h/Single-DoseGenerate process injection binaries
wavestone-cdt/EdrSandblastEDRSandBlast is a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Kernel callbacks and ETW TI provider) and LSASS protections
xct/morbolSimple AV Evasion for PE Files
Yaxser/BackstabA tool to kill antimalware protected processes
Yet-Zio/WusaBypassUACUAC bypass abusing WinSxS in "wusa.exe".
xforcered/InvisibilityCloakProof-of-concept obfuscation toolkit for C# post-exploitation tools
zeroperil/HookDumpSecurity product hook detection
zeroSteiner/crimson-forgeCrimson Forge intends to provide sustainable evasion capabilities for native code on the x86 and AMD64 architectures.
1919 | 1920 | ## Credential Access 1921 | 1922 | 1923 | 1924 | 1925 | 1926 | 1927 | 1928 | 1929 | 1930 | 1931 | 1932 | 1933 | 1934 | 1935 | 1936 | 1937 | 1938 | 1939 | 1940 | 1941 | 1942 | 1943 | 1944 | 1945 | 1946 | 1947 | 1948 | 1949 | 1950 | 1951 | 1952 | 1953 | 1954 | 1955 | 1956 | 1957 | 1958 | 1959 | 1960 | 1961 | 1962 | 1963 | 1964 | 1965 | 1966 | 1967 | 1968 | 1969 | 1970 | 1971 | 1972 | 1973 | 1974 | 1975 | 1976 | 1977 | 1978 | 1979 | 1980 | 1981 | 1982 | 1983 | 1984 | 1985 | 1986 | 1987 | 1988 | 1989 | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2015 | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 | 2022 | 2023 | 2024 | 2025 | 2026 | 2027 | 2028 | 2029 | 2030 | 2031 | 2032 | 2033 | 2034 | 2035 | 2036 | 2037 | 2038 | 2039 | 2040 | 2041 | 2042 | 2043 | 2044 | 2045 | 2046 | 2048 | 2049 | 2050 | 2051 | 2053 | 2054 | 2055 | 2056 | 2057 | 2058 | 2059 | 2060 | 2061 | 2062 | 2063 | 2064 | 2066 | 2067 | 2068 | 2069 | 2070 | 2071 | 2072 | 2073 | 2075 | 2076 | 2077 | 2078 | 2079 | 2080 | 2081 | 2082 | 2083 | 2084 | 2085 | 2086 | 2087 | 2088 | 2089 | 2090 | 2091 | 2092 | 2093 | 2094 | 2095 | 2096 | 2097 | 2098 | 2099 | 2100 | 2101 | 2102 | 2103 | 2104 | 2105 | 2106 | 2107 | 2108 | 2109 | 2110 | 2111 | 2112 | 2113 | 2114 | 2115 | 2116 | 2117 | 2118 | 2119 | 2120 | 2121 | 2122 | 2123 | 2124 | 2125 | 2126 | 2127 | 2128 | 2129 | 2130 | 2131 | 2132 | 2133 | 2134 | 2135 | 2136 | 2137 | 2138 | 2139 | 2140 | 2141 | 2142 | 2143 | 2144 | 2145 | 2146 | 2147 | 2148 | 2149 | 2150 | 2151 | 2152 | 2153 | 2154 | 2155 | 2156 | 2157 | 2158 | 2159 | 2160 | 2161 | 2162 | 2163 | 2164 | 2165 | 2167 | 2168 | 2169 | 2170 | 2171 | 2172 | 2173 | 2174 | 2175 | 2176 | 2177 | 2178 | 2180 | 2181 | 2182 | 2183 | 2184 | 2185 | 2186 | 2187 | 2188 | 2189 | 2190 | 2191 | 2192 | 2193 | 2194 | 2195 | 2196 | 2197 | 2198 | 2199 | 2200 | 2201 | 2202 | 2203 | 2204 | 2205 | 2206 | 2207 | 2208 | 2209 | 2210 | 2211 | 2212 | 2213 | 2214 | 2215 | 2216 | 2217 | 2218 | 2219 | 2220 | 2221 | 2222 | 2223 | 2224 | 2225 | 2226 | 2227 | 2228 | 2229 | 2230 | 2231 | 2232 | 2233 | 2234 | 2235 | 2236 | 2237 | 2238 | 2239 | 2240 | 2241 | 2242 | 2243 | 2244 | 2245 | 2246 | 2247 | 2248 | 2249 | 2250 | 2251 | 2252 | 2253 | 2254 | 2255 | 2256 | 2257 | 2258 | 2259 | 2260 | 2261 | 2262 | 2263 | 2264 | 2265 | 2266 | 2267 | 2268 | 2269 | 2270 | 2271 | 2272 | 2273 | 2274 | 2275 | 2276 | 2277 | 2278 | 2279 | 2280 | 2281 | 2282 | 2283 | 2284 | 2285 | 2286 | 2288 | 2291 | 2292 | 2293 | 2294 | 2295 | 2296 | 2297 | 2298 | 2299 | 2300 | 2301 | 2302 | 2303 | 2304 | 2305 | 2306 | 2307 | 2308 | 2309 | 2310 | 2311 | 2312 |
LinkDescription
0xZDH/o365sprayUsername enumeration and password spraying tool aimed at Microsoft O365.
aas-n/spraykatzCredentials gathering tool automating remote procdump and parse of lsass process.
alfarom256/BOF-ForeignLsassLSASS Dumping With Foreign Handles
anthemtotheego/CredBanditProof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel
antonioCoco/MalSeclogonA little tool to play with the Seclogon service
Arvanaghi/SessionGopherSessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
b4rtik/SharpKatzPorting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands
b4rtik/SharpMiniDumpCreate a minidump of the LSASS process from memory
Barbarisch/forkatzcredential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege
blacklanternsecurity/TREVORsprayA featureful round-robin SOCKS proxy and Python O365 sprayer based on MSOLSpray which uses the Microsoft Graph API
byt3bl33d3r/SprayingToolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
CCob/lsarelayxNTLM relaying for Windows made easy
CCob/MirrorDumpAnother LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in memory
codewhitesec/HandleKatzPIC lsass dumper using cloned handles
connormcgarr/tgtdelegationtgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"
cube0x0/BofRoastBeacon Object Files for roasting Active Directory
cube0x0/KrbRelayFramework for Kerberos relaying
cube0x0/MiniDumpC# Lsass parser
cube0x0/SharpSystemTriggersCollection of remote authentication triggers in C#
dafthack/MSOLSprayA password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the account, if a tenant doesn't exist, if a user doesn't exist, if the account is locked, or if the account is disabled.
danf42/GetLsaSecretsC# implementation of Get-LSASecrets originally written in PowerShell
DanMcInerney/icebreakerGets plaintext Active Directory credentials if you're on the internal network but outside the AD environment 2014 |
deepinstinct/LsassSilentProcessExitCommand line interface to dump LSASS memory to disk via SilentProcessExit
djhohnstein/1PasswordSuiteUtilities to extract secrets from 1Password
Dramelac/GoldenCopyCopy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.
eladshamir/Internal-MonologueInternal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
EspressoCake/HandleKatz_BOFA BOF port of the research of @thefLinkk and @codewhitesec
EspressoCake/PPLDump_BOFA faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.
fireeye/ADFSpoofA python tool to forge AD FS security tokens.
Flangvik/BetterSafetyKatzFork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from 2047 | gentilkiwi GitHub repo, runtime patches signatures and uses SharpSploit DInvoke to PE-Load into memory.
FSecureLABS/physmem2profit Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical 2052 | memory remotely
FSecureLABS/SharpClipHistorySharpClipHistory is a .NET application written in C# that can be used to read the contents of a user's clipboard history in Windows 10 starting from the 1809 Build.
G0ldenGunSec/SharpSecDump.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
GhostPack/SafetyKatzSafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subTee's 2065 | .NET PE Loader
GhostPack/SharpDumpSharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality.
GhostPack/RubeusRubeus is a C# toolset for raw Kerberos interaction and abusesRubeus is a C# toolset for raw Kerberos 2074 | interaction and abuses
gitjdm/dumper2020Yet another LSASS dumper
GossiTheDog/HiveNightmareExploit allowing you to read registry hives as non-admin
Greenwolf/ntlm_theftA tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
Hackndo/lsassyExtract credentials from lsass remotely
helpsystems/nanodumpDumping LSASS has never been so stealthy
horizon3ai/vcenter_saml_loginA tool to extract the IdP cert from vCenter backups and log in as Administrator
HunnicCyber/SharpDomainSprayBasic password spraying tool for internal tests and red teaming
icyguider/DumpNParseA Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.
IlanKalendarov/PyHookPyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call.
IlanKalendarov/SharpHookSharpHook is inspired by the SharpRDPThief project, It uses various API hooks in order to give us the desired credentials.
iomoath/SharpSprayActive Directory password spraying tool. Auto fetches user list and avoids potential lockouts.
itm4n/PPLdumpDump the memory of a PPL with a userland exploit
jfmaes/SharpHandlerDuplicating handles to dump LSASS since 2021
jfmaes/SharpRDPDumpCreate a minidump of TermService for clear text pw extraction
Kevin-Robertson/InveighWindows PowerShell ADIDNS/LLMNR/mDNS/NBNS spoofer/man-in-the-middle tool
kindtime/nosferatuLsass NTLM Authentication Backdoor
knavesec/CredMasterRefactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling
KoreLogicSecurity/wmkickWMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSMan/WinRM (5985/tcp) to capture NetNTLMv2 hashes.
LuemmelSec/SAML2SprayPython Script for SAML2 Authentication Passwordspray
m0rv4i/SafetyDumpDump stuff without touching disk
MadHatt3R-0x90/SharpPuppetTool Allowing Keystroke Injection Into Arbitrary Window.
mdsecactivebreach/FarmerFarmer is a project for collecting NetNTLM hashes in a Windows domain. Farmer achieves this by creating a local WebDAV server that causes the WebDAV Mini Redirector to authenticate from any connecting clients.
mobdk/CopyCat 2166 | Simple rapper for Mimikatz, bypass Defender
mobdk/CoreClassMimikatz embedded as classes
mobdk/WinBoostExecute Mimikatz with different technique
nidem/kerberoastKerberoast is a series of tools for attacking MS Kerberos implementations. Below is a brief overview of what 2179 | each tool does.
optiv/TalonA password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.
oxfemale/LogonCredentialsStealLOCAL AND REMOTE HOOK msv1_0!SpAcceptCredentials from LSASS.exe and DUMP DOMAIN/LOGIN/PASSWORD IN CLEARTEXT to text file.
peewpw/Invoke-WCMDumpPowerShell Script to Dump Windows Credentials from the Credential Manager
Pickfordmatt/SharpLockerSharpLocker helps get current user credentials by popping a fake Windows lock screen, all output is sent to Console which works perfect for Cobalt Strike.
PorLaCola25/TransactedSharpMiniDumpImplementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS using sockets.
postrequest/safetydumpMiniDump a process in memory with rust
putterpanda/mimikittenzA post-exploitation powershell tool for extracting juicy info from memory.
RedCursorSecurityConsulting/SharpHashSprayAn execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.
ricardojoserf/adfsbruteA script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.
ropnop/kerbruteA tool to perform Kerberos pre-auth bruteforcing
r3ggi/NoMADCredentialsStealer/NoMAD Credentials Stealer
rvrsh3ll/SharpEdgeC# Implementation of Get-VaultCredential
rvrsh3ll/TokenTacticsAzure JWT Token Manipulation Toolset
rvrsh3ll/SharpSMBSpraySpray a hash via smb to check for local administrator access
S3cur3Th1sSh1t/RDPThiefInjectRDPThief donut shellcode inject into mstsc
sec-consult/aggrokatzAggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it to parse LSASS dump files and registry hive files to extract credentials and other secrets stored without downloading the file and without uploading any suspicious code to the beacon.
secureworks/whiskeysamlandfriendsGoldenSAML Attack Libraries and Framework
secdev-01/Mimikore.NET 5 Single file Application . Mimikatz or any Base64 PE Loader.
shantanu561993/SharpLoginPromptThis Program creates a login prompt to gather username and password of the current user. This project allows red team to phish username and password of the current user without touching lsass and having adminitrator credentials on the system.
ShutdownRepo/smartbrutePassword spraying and bruteforcing tool for Active Directory Domain Services
skelsec/pypykatzMimikatz implementation in pure Python
SnaffCon/SnafflerSnaffler is a tool for pentesters to help find delicious candy needles (creds mostly, but it's flexible) in a bunch of horrible boring haystacks (a massive Windows/AD environment).
swisskyrepo/SharpLAPSRetrieve LAPS password from LDAP
treebuilder/aad-sso-enum-brute-sprayPOC of SecureWorks' recent Azure Active Directory password brute-forcing vuln
uknowsec/SharpDecryptPwd对密码已保存在 Windwos 系统上的部分程序进行解析,包括:Navicat,TeamViewer,FileZilla,WinSCP,Xmangager系列产品(Xshell,Xftp)。
ustayready/SharpHoseAsynchronous Password Spraying Tool in C# for Windows Environments
Viralmaniar/Remote-Desktop-Caching- 2287 | This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These 2289 | PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive 2290 | information on the screen.
VollRagm/KernelBypassSharpC# Kernel Mode Driver to read and write memory in protected processes
vyrus001/go-mimikatzA wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.
w1u0u1/minidumpCustom implementation of DbgHelp's MiniDumpWriteDump function. Uses static syscalls to replace low-level functions like NtReadVirtualMemory.
Wra7h/SharpGhostingProcess Ghosting in C#
zcgonvh/SSMSPwdSQL Server Management Studio(SSMS) saved password dumper
2313 | 2314 | ## Lateral Movement 2315 | 2316 | 2317 | 2318 | 2319 | 2320 | 2321 | 2322 | 2323 | 2324 | 2325 | 2326 | 2327 | 2328 | 2329 | 2330 | 2331 | 2332 | 2333 | 2334 | 2335 | 2336 | 2337 | 2338 | 2339 | 2340 | 2341 | 2342 | 2343 | 2344 | 2345 | 2346 | 2347 | 2348 | 2349 | 2350 | 2351 | 2352 | 2353 | 2354 | 2355 | 2356 | 2357 | 2358 | 2359 | 2360 | 2361 | 2362 | 2363 | 2364 | 2365 | 2366 | 2367 | 2368 | 2369 | 2370 | 2371 | 2372 | 2373 | 2374 | 2375 | 2376 | 2377 | 2378 | 2379 | 2380 | 2381 | 2382 | 2383 | 2384 | 2385 | 2386 | 2387 | 2388 | 2389 | 2390 | 2391 | 2393 | 2394 | 2395 | 2396 | 2397 | 2398 | 2399 | 2400 | 2401 | 2402 | 2403 | 2404 | 2405 | 2406 | 2407 | 2408 | 2409 | 2410 | 2411 | 2412 | 2413 | 2414 | 2415 | 2416 | 2417 | 2418 | 2419 | 2420 | 2421 | 2422 | 2423 | 2424 | 2425 | 2426 | 2427 | 2428 | 2429 | 2430 | 2431 | 2432 | 2433 | 2434 | 2435 | 2436 | 2437 | 2438 | 2439 | 2440 | 2441 | 2442 | 2443 | 2444 | 2445 | 2446 | 2447 | 2448 | 2449 | 2450 | 2451 | 2452 | 2453 | 2454 |
LinkDescription
0xcpu/winsmsdWindows (ShadowMove) Socket Duplication
0xthirteen/MoveKitCobalt Strike kit for Lateral Movement
0xthirteen/SharpMove.NET Project for performing Authenticated Remote Execution
0xthirteen/SharpRDPRemote Desktop Protocol .NET Console Application for Authenticated Command Execution
360-Linton-Lab/WMIHACKERA Bypass Anti-virus Software Lateral Movement Command Execution Tool
anthemtotheego/SharpExecSharpExec is an offensive security C# tool designed to aid with lateral movement.
bigb0sss/BankaiAnother Go Shellcode Loader
bohops/WSMan-WinRMA collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object
byt3bl33d3r/CrackMapExecA swiss army knife for pentesting networks
cube0x0/SharpMapExecA sharpen version of CrackMapExec. This tool is made to simplify penetration testing of networks and to create a swiss army knife that is made for running on Windows which is often a requirement during insider threat simulation engagements.
cube0x0/SharpSystemTriggersCollection of remote authentication triggers in C#
cobbr/SharpSploitSharpSploit is a .NET post-exploitation library written in C#
cyberark/shimitA tool that implements the Golden SAML attack
DefensiveOrigins/PlumHoundBloodhound for Blue and Purple Teams
FuzzySecurity/StandInStandIn is a small .NET35/45 AD post-exploitation toolkit
Hackplayers/evil-winrmThe ultimate WinRM shell for hacking/pentesting
improsec/ImproHoundIdentify the attack paths in BloodHound breaking your AD tiering
infosecn1nja/SharpDoorSharpDoor is alternative RDPWrap written in C# to allowed multiple RDP (Remote Desktop) sessions by patching 2392 | termsrv.dll file.
iomoath/SharpStrikeSharpStrike is a post-exploitation tool written in C# that uses either CIM or WMI to query remote systems. It can use provided credentials or the current user's session.
juliourena/SharpNoPSExecGet file less command execution for lateral movement.
klezVirus/CheeseToolsSelf-developed tools for Lateral Movement/Code Execution
knavesec/MaxMaximizing BloodHound. Max is a good boy.
mez-0/CSharpWinRM.NET 4.0 WinRM API Command Execution
mez-0/winrmdllC++ WinRM API via Reflective DLL
Mr-Un1k0d3r/SCShellFileless lateral movement tool that relies on ChangeServiceConfigA to run command
netero1010/ServiceMove-BOFNew lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.
RiccardoAncarani/LiquidSnakeLiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript
RiccardoAncarani/TaskShellTaskShell
rvrsh3ll/SharpCOMSharpCOM is a c# port of Invoke-DCOM
ScorpionesLabs/DVSD(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects
tothi/rbcd-attackKerberos Resource-Based Constrained Delegation Attack from Outside using Impacket
theepicpowner/dcom_av_execDCOM_AV_EXEC allows for "diskless" lateral movement to a target on the same network via DCOM. The AV_Bypass_Framework_V3 creates a .NET shellcode runner (output as DLL) which can be used with the DCOM_AV_EXEC tool to bypass antivirus solutions like Microsoft Defender as all shellcode is AES encrypted and executed in memory.
/whydee86/SnD_AMSIStart new PowerShell without etw and amsi in pure nim
2455 | 2456 | ## Collection 2457 | 2458 | 2459 | 2460 | 2461 | 2462 | 2463 | 2464 | 2465 | 2466 | 2467 | 2468 | 2469 | 2470 | 2471 | 2472 | 2473 | 2474 | 2475 | 2476 | 2477 | 2478 | 2479 | 2480 | 2481 | 2482 | 2483 | 2484 | 2485 | 2486 | 2487 |
LinkDescription
cisp/GetMail利用NTLM Hash读取Exchange邮件
DallasFR/Cobalt-ClipCobaltstrike addons to interact with clipboard
djhohnstein/SharpChromium.NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins.
OG-Sadpanda/SharpExceliburRead Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly
OG-Sadpanda/SharpSwordRead the contents of DOCX files using Cobalt Strike's Execute-Assembly
seastorm/PuttyRiderHijack Putty sessions in order to sniff conversation and inject Linux commands.
2488 | 2489 | ## Command & Control 2490 | 2491 | 2492 | 2493 | 2494 | 2495 | 2496 | 2497 | 2498 | 2501 | 2502 | 2503 | 2504 | 2505 | 2506 | 2507 | 2508 | 2509 | 2510 | 2511 | 2512 | 2513 | 2514 | 2515 | 2516 | 2517 | 2518 | 2519 | 2520 | 2521 | 2522 | 2523 | 2524 | 2525 | 2526 | 2527 | 2528 | 2529 | 2530 | 2531 | 2532 | 2533 | 2534 | 2535 | 2536 | 2537 | 2538 | 2539 | 2540 | 2543 | 2544 | 2545 | 2546 | 2547 | 2548 | 2549 | 2550 | 2551 | 2552 | 2553 | 2554 | 2555 | 2556 | 2557 | 2558 | 2559 | 2560 | 2561 | 2562 | 2563 | 2564 | 2565 | 2566 | 2567 | 2568 | 2569 | 2570 | 2571 | 2572 | 2573 | 2574 | 2575 | 2576 | 2577 | 2578 | 2579 | 2580 | 2581 | 2582 | 2583 | 2584 | 2585 | 2586 | 2587 | 2588 | 2589 | 2590 | 2591 | 2592 | 2593 | 2594 | 2595 | 2596 | 2597 | 2598 | 2599 | 2600 | 2601 | 2602 | 2603 | 2604 | 2605 | 2606 | 2607 | 2608 | 2609 | 2610 | 2611 | 2612 | 2613 | 2614 | 2615 | 2616 | 2617 | 2618 | 2619 | 2620 | 2621 | 2622 | 2623 | 2624 | 2625 | 2626 | 2627 | 2628 | 2629 | 2630 | 2631 | 2632 | 2633 | 2634 | 2635 | 2636 | 2637 | 2638 | 2639 | 2640 | 2641 | 2642 | 2643 | 2644 | 2645 | 2646 | 2648 | 2649 | 2650 | 2651 | 2652 | 2653 | 2654 | 2655 | 2656 | 2657 | 2658 | 2659 | 2660 | 2661 | 2662 | 2663 | 2664 | 2665 | 2666 | 2667 | 2668 | 2669 | 2670 | 2671 | 2672 | 2673 | 2674 | 2675 | 2676 | 2677 | 2678 | 2679 | 2680 | 2681 | 2682 | 2683 | 2685 | 2686 | 2687 | 2688 | 2689 | 2690 | 2691 | 2692 | 2693 | 2694 | 2695 | 2696 | 2697 | 2698 | 2699 | 2700 | 2701 | 2702 | 2703 | 2704 | 2705 | 2706 | 2707 | 2708 | 2709 | 2710 | 2711 | 2712 | 2713 | 2714 | 2715 | 2716 | 2717 | 2718 | 2719 | 2720 | 2721 | 2722 |
LinkDescription
3xpl01tc0d3r/CallidusIt is developed using .net core framework in C# language. Allows operators to leverage O365 services for 2499 | establishing command & control communication channel. It usages Microsoft Graph APIs for communicating with 2500 | O365 services.
ahmedkhlief/NinjaOpen source C2 server created for stealth red team operations
bashexplode/cs2webconfigConvert Cobalt Strike profiles to IIS web.config files
bats3c/shad0wSHAD0W is a modular C2 framework designed to successfully operate on mature environments.
BishopFox/sliverSliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants are dynamically compiled with unique X.509 certificates signed by a per-instance certificate authority generated when you first run the binary.
blackbotinc/Atomic-Red-Team-Intelligence-C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
boku7/azureOutlookC2Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
byt3bl33d3r/SILENTTRINITYAn asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
cedowens/C2_CradleTool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers from a list of options. This is helpful for automating C2 server setup.
cobbr/C2BridgeC2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.
cobbr/Covenant Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make 2541 | the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for 2542 | red teamers.
Cr4sh/MicroBackdoorSmall and convenient C2 tool for Windows targets
cyberark/kubesploitKubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
d4rckh/nimc2nimc2 is a very lightweight C2 written fully in nim (implant & server).
DeimosC2/DeimosC2DeimosC2 is a Golang command and control framework for post-exploitation.
Dliv3/DomainBorrowingDomain Borrowing is a new method to hide your C2 traffic with CDN
echtdefault/C2-GUI-TemplateTemplate for a C2 GUI coded in C++ using Win32 API
EspressoCake/Cobalt_Strike_AnsibleA project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.
fbkcs/ThunderDNSThis tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.
Flangvik/AzureC2RelayAzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.
geemion/Khepri🔥🔥🔥Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++, the architecture and usage like Cobalt Strike
gl4ssesbo1/NebulaCloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
Gr1mmie/AtlasC2C# C2 Framework centered around Stage 1 operations
its-a-feature/MythicA collaborative, multi-platform, red teaming framework
kgretzky/pwndropSelf-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
leonjza/tc2Treafik fronted c2 examples
looCiprian/GC2-sheetGC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive.
loseys/BlackMambaBlackMamba is a multi client C2/post exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework.
mttaggart/OffensiveNotionNotion as a platform for offensive operations
mgeeky/RedWardenCobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
mhaskar/DNSStagerDNSStager is an open-source project based on Python used to hide and transfer your payload using DNS.
mhaskar/OctopusOpen source pre-operation C2 server based on python and powershell
MythicAgents/AthenaAthena is a fully-featured cross-platform agent designed using the .NET 6. Athena is designed for Mythic 2.2 and newer.
MythicAgents/hermesSwift 5 macOS implant
NetSPI/SQLC2SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and the agent.
nettitude/SharpSocksTunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell
Ne0nd0g/merlinMerlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang. 2647 |
p3nt4/Invoke-SocksProxySocks proxy, and reverse socks server using powershell.
p3nt4/NuagesA modular C2 framework
Porchetta-Industries/pyMalleableC2Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.
Project PrismaticaProject Prismatica is a focused framework for Command and Control that is dedicated to extensibility.
pucarasec/zuthakaZuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and other post-exploitation tools.
r3nhat/GRAT2GRAT2 is a Command and Control (C2) tool written in python3 and the client in .NET 4.5
sensepost/goDoHgodoh - A DNS-over-HTTPS C2
shadown-workers/shadow-workersShadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
SpiderLabs/DoHC2DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be 2684 | leveraged for command and control (C2) via DNS over HTTPS (DoH).
sysdream/ligoloReverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/
thiagomayllart/HarvisHarvis is designed to automate your C2 Infrastructure.
threatexpress/mythic2modrewriteGenerate Apache mod_rewrite rules for Mythic C2 profiles
threatexpress/random_c2_profileCobalt Strike random C2 Profile generator
tnpitsecurity/ligolo-ngvAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Tylous/SourcePointSourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
vestjoe/cobaltstrike_servicesRunning Cobalstrike Teamserver as a Service
X-C3LL/wfp-readerProof of concept - Covert Channel using Windows Filtering Platform (C#)
zerosum0x0/koadicKoadic C3 COM Command & Control - JScript RAT
2723 | 2724 | ## Exfiltration 2725 | 2726 | 2727 | 2728 | 2729 | 2730 | 2731 | 2732 | 2733 | 2734 | 2735 | 2736 | 2737 | 2738 | 2739 | 2740 | 2741 | 2742 | 2743 | 2744 | 2745 | 2746 | 2747 | 2748 | 2749 | 2750 | 2751 | 2752 | 2753 | 2754 | 2755 | 2756 | 2757 | 2758 | 2759 | 2760 | 2762 | 2766 | 2767 | 2768 | 2769 | 2771 | 2772 | 2773 | 2774 | 2775 | 2776 | 2777 | 2778 | 2780 | 2781 | 2782 | 2783 | 2784 | 2785 | 2786 | 2787 | 2788 | 2789 | 2790 | 2791 | 2793 | 2794 |
LinkDescription
0xC01DF00D/CollabfiltratorExfiltrate blind remote code execution output over DNS via Burp Collaborator.
ariary/QueenSonoGolang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)
evilsocket/sg1A wanna be swiss army knife for data encryption, exfiltration and covert communication.
Flangvik/SharpExfiltrateModular C# framework to exfiltrate loot over secure and trusted channels.
hackerschoice/gsocketGlobal Socket. Moving data from here to there. Securely, Fast and trough NAT/Firewalls
hackerschoice/gs-transferSecure File Transfer via Global Socket Bounce Network
m57/dnstealDNS Exfiltration tool for stealthily sending files over DNS requests.
mdsecactivebreach/RegistryStrikesBack 2761 | RegistryStrikesBack allows a red team operator to export valid .reg files for portions of the Windows 2763 | Registry via a .NET assembly that should run as a standard user. It can be useful in exfiltrating config 2764 | files such as to support actions like are described in the "Segmentation Vault" article on the MDSec Blog. 2765 |
pentestpartners/PTP-RATExfiltrate data over screen interfaces. For 2770 | more information.
Plazmaz/LNKUpGenerates malicious LNK file payloads for data exfiltration
sensepost/DETDET (is provided AS IS), is a proof of concept to perform Data Exfiltration using either single or multiple 2779 | channel(s) at the same time.
SySS-Research/SethPerform a MitM attack and extract clear text credentials from RDP connections
veggiedefender/browsertunnelSurreptitiously exfiltrate data from the browser over DNS
vp777/procrustesA bash script that automates the exfiltration of data over dns in case we have a blind command execution on 2792 | a server where all outbound connections except DNS are blocked.
2795 | --------------------------------------------------------------------------------