claysec's repos on GitHub
C · 1263 人关注
BokuLoader
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
C · 463 人关注
azureOutlookC2
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
C · 193 人关注
AsmHalosGate
x64 Assembly HalosGate direct System Caller to evade EDR UserLand hooks
Python · 10 人关注
CVE-2020-23839
Public PoC Disclosure for CVE-2020-23839 - GetSimple CMS v3.3.16 suffers from a Reflected XSS on the Admin Login Portal
8 人关注
DarkWidow
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
5 人关注
Ares
Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique
5 人关注
beacon
Former attempt at creating a independent Cobalt Strike Beacon
Python · 4 人关注
fuzzingFTP
Python scripts for fuzzing FTP servers, with percision, over TCP
3 人关注
Apollo
A .NET Framework 4.0 Windows Agent
Python · 2 人关注
aCal-RCE
Exploit Development files for aCal web application - reflected XSS to RCE.
C · 2 人关注
AceLdr
Cobalt Strike UDRL for memory scanner evasion.
2 人关注
ADOKit
Azure DevOps Services Attack Toolkit
1 人关注
Azur3Alph4
Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved) position.
1 人关注
BarracudaDrivev6.5-LocalPrivEsc
Insecure Service File Permissions in bd service in Real Time Logics BarracudaDrive v6.5 allows local attackers to escalate privileges to admin via replacing the bd.exe file and restarting the computer where it will be run as 'LocalSystem' on the next startup automatically.
1 人关注
cobalt_strike_extension_kit
Attempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
1 人关注
DayBird
Extension functionality for the NightHawk operator client
1 人关注
GraphRunner
A Post-exploitation Toolset for Interacting with the Microsoft Graph API
Shell · 0 人关注
AV_Bypass-Splitter
Splitter script to identify Anti-Virus signature of an executable
0 人关注
ElevateKit
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.