Category: Exploitation

Covert C2 Framework

LARRYCHATTER: Covert C2 Framework

LARRYCHATTER Introduction: Introducing a super-stealthy extra sneaky Python-based C2 Framework that uses Twitter & Dropbox as a C2 Server. This project has been inspired by the Russian threat-group APT-29’s own...

LDAPFragger

LDAPFragger: Command and Control tool

LDAPFragger LDAPFragger is a Command and Control tool that enables attackers to route Cobalt Strike beacon data over LDAP using user attributes. The tool will query the Active Directory domain...

ReverseShellDll

ReverseShellDll: C++ Windows Reverse Shell

ReverseShellDLL C++ Windows Reverse Shell – Universal DLL Hijack | SSL Encryption | Statically Linked Main Features Universal DLL Hijack – ReverseShellDLL uses the DLL_PROCESS_ATTACH notification to ensure that the...

polyshell

PolyShell: a Bash/Batch/PowerShell polyglot

PolyShell: a Bash/Batch/PowerShell polyglot PolyShell is a script that’s simultaneously valid in Bash, Windows Batch, and PowerShell (i.e. a polyglot). This makes PolyShell a useful template for penetration testing as it...

xencrypt

xencrypt: PowerShell script anti-virus evasion tool

Xencrypt Tired of wasting lots of time obfuscating PowerShell scripts like invoke-mimikatz only to have them get detected anyway? Wouldn’t it be awesome if you could take any script and...