Category: Exploitation

defeating Malware Analysts

BeatRev: frustrating/defeating Malware Analysts

BeatRev Version 2 The first time the malware runs on a victim it AES encrypts the actual payload(an RDLL) using environmental data from that victim. Each subsequent time the malware...

Windows reverse shell

hoaxshell: unconventional Windows reverse shell

hoaxshell hoaxshell is an unconventional Windows reverse shell, currently undetected by Microsoft Defender and other AV solutions as it is solely based on http(s) traffic. The tool is easy to...

VLAN attacks

VLANPWN: VLAN attacks toolkit

VLANPWN VLAN attacks toolkit DoubleTagging.py – This tool is designed to carry out a VLAN Hopping attack. VLAN hopping is a computer security exploit, a method of attacking networked resources...

lightweight C2 nim

nimc2: very lightweight C2 written fully in nim

nimc2 nimc2 is a very lightweight C2 written fully in nim (implant & server). Its features include: Windows & Linux implant generation TCP socket communication (with HTTP communication coming soon) Ability to create...