Category: Exploitation

darkarmour Windows AV Evasion

DarkArmour: Windows AV Evasion tool

Windows AV Evasion Tool Store and execute an encrypted windows binary from inside memory, without a single bit touching disk. Installation It uses the python stdlib so no need to...

TrelloC2

TrelloC2: Simple C2 over the Trello API

TrelloC2 Simple C2 over Trello’s API (Proof-of-Concept) Requirements Python 3.x Setup Clone the repo: git clone https://github.com/securemode/TrelloC2.git Create a Trello account: https://trello.com/signup Once logged in, get your API key: https://trello.com/app-key Generate a...

FudgeC2

FudgeC2: A collaborative C2 framework for purple-teaming

FudgeC2 FudgeC2 is a campaign-orientated Powershell C2 framework built on Python3/Flask – Designed for team collaboration, client interaction, campaign timelining, and usage visibility. Users Users within Fudge are divided into...