There are no reviews yet. Be the first to send feedback to the community and the maintainers!
PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.xss_payloads
Exploitation for XSSPoshC2_Old
Powershell C2 Server and ImplantsSharpSocks
Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShellSharpWSUS
RunPE
C# Reflective loader for unmanaged binaries.SimplePELoader
In-Memory PE LoaderProwl
ETWHash
C# POC to extract NetNTLMv1/v2 hashes from ETW providerMalSCCM
scrounger
Mobile application testing toolkitShellcodeMutator
Aladdin
Tartarus-TpAllocInject
RunOF
Invoke-PowerThIEf
The PowerThIEf, an Internet Explorer Post Exploitation libraryDLLInjection
DLL Injection Library & ToolsSharpConflux
zeropress
A dumb script for finding dumb coding errors in WordPress pluginsCVE-2024-20356
This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.CVE-2024-25153
Proof-of-concept exploit for CVE-2024-25153.defensive-scripts
Defence Against the Dark ArtsInlineFunctionHooking
Windows Inline function hooking library targeted at MSVCpwnlyoffice
Exploit ONLYOFFICE ImplementationsPoshC2_IOCs
A list of IOCs applicable to PoshC2SyscallsExtractor
logparser
SQL scripts for querying event logsyasha
metasploit-modules
Modules created by Nettitude for MetasploitPoshC2_Shellcode
Supporting projects for PoshC2CVE-2022-23253-PoC
CVE-2022-23253 PoCPoshC2_Linux_Implant
PBind
PBind payloads for PoshC2secure-development-training
PoshC2_Core
FComm
FComm payloads for PoshC2Love Open Source and this site? Check out how you can help us