Commander is a command and control framework (C2) written in Python, Flask and SQLite. It comes with two agents written in …
TelegramRAT – Cross Platform Telegram Based RAT That Communicates Via Telegram To Evade Network Restrictions
Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions 1. git clone https://github.com/machine1337/TelegramRAT.git2. Now Follow the …
PythonMemoryModule – Pure-Python Implementation Of MemoryModule Technique To Load Dll And Unmanaged Exe Entirely From Memory
“Python memory module” AI generated pic – hotpot.ai pure-python implementation of MemoryModule technique to load a dll or unmanaged exe …
Sh4D0Wup – Signing-key Abuse And Update Exploitation Framework
<meta content="Signing-key abuse and update exploitation framework. % docker run -it –rm ghcr.io/kpcyrd/sh4d0wup:edge -h Usage: sh4d0wup [OPTIONS] <meta content="Signing-key abuse …
Gmailc2 – A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic Restrictions
This RAT communicates Via Gmail SMTP (or u can use any other smtps as well) but Gmail SMTP is validbecause …
Pyramid – A Tool To Help Operate In EDRs’ Blind Spots
Pyramid is a set of Python scripts and module dependencies that can be used to evade EDRs. The main purpose …
Klyda – Highly Configurable Script For Dictionary/Spray Attacks Against Online Web Applications
The Klyda project has been created to aid in quick credential based attacks against online web applications.Klyda supports the use …
nuvola – Tool To Dump And Perform Automatic And Manual Security Analysis On Aws Environments Configurations And Services
nuvola (with the lowercase n) is a tool to dump and perform automatic and manual security analysis on AWS environments …
Chisel-Strike – A .NET XOR Encrypted Cobalt Strike Aggressor Implementation For Chisel To Utilize Faster Proxy And Advanced Socks5 Capabilities
A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities. Why write …
SharpStrike – A Post Exploitation Tool Written In C# Uses Either CIM Or WMI To Query Remote Systems
SharpStrike is a post-exploitation tool written in C# that uses either CIM or WMI to query remote systems. It can …