Malleable C2 Profile Generator
Malleable C2 profile generator for Cobalt Strike and Sliver. Produces profiles that mimic legitimate CDN, cloud service, and popular app traffic.
Professional offensive security tools & exploit frameworks
Malleable C2 profile generator for Cobalt Strike and Sliver. Produces profiles that mimic legitimate CDN, cloud service, and popular app traffic.
Standalone SOCKS5 pivoting module in C. Static binary under 100KB that creates a SOCKS5 proxy on the compromised host for pivoting into internal networks.
C/C++ library with 8 Windows process injection techniques: Classic DLL, Process Hollowing, APC Queue, Syscall-based, and more.
Bash/Terraform script that deploys complete phishing infrastructure: GoPhish + Evilginx2 + categorized domain + SSL certificates.
Pack of 15 Beacon Object Files (BOFs) for Cobalt Strike: enumeration, credential access, lateral movement, and defense evasion.
Pure PowerShell script (no external modules) for complete Active Directory enumeration: users, groups, GPOs, ACLs, trusts, SPNs.
Python script that performs Kerberoasting against Active Directory: requests TGS tickets for SPN-enabled accounts and exports hashes for offline cracking.
Custom .NET C2 agent generator: HTTP/HTTPS/SMB stagers with obfuscation, in-memory compilation, and AMSI evasion.
Collection of scripts and configurations for advanced SSH pivoting: local/remote/dynamic forwarding, ProxyJump chains, and SOCKS routing.
Python module for NTLM relay attacks: captures NTLM authentications and relays them to SMB, LDAP, HTTP, MSSQL services.