Windows – Seamless Integration And Management

Explore the innovative approach to running Windows inside a Docker container, offering a streamlined and flexible solution for developers and IT professionals. This guide provides an in-depth look at setting up Windows environments using Docker, from automatic ISO downloads and KVM acceleration to web-based management. Whether you’re looking to create a Windows 11 machine or …

Nimbo-C2 : Lightweight C2 Framework

Nimbo-C2 is yet another (simple and lightweight) C2 framework. Nimbo-C2 agent supports x64 Windows & Linux. It’s written in Nim, with some usage of .NET on Windows (by dynamically loading the CLR to the process). Nim is powerful, but interacting with Windows is much easier and robust using Powershell, hence this combination is made. The …

Striker : A Command And Control (C2)

Striker is a simple Command and Control (C2) program. This project is under active development. Most of the features are experimental, with more to come. Expect breaking changes. Features A) Agents B) Backend / Teamserver C) User Interface Installing Striker Clone the repo; $ git clone https://github.com/4g3nt47/Striker.git $ cd Striker The codebase is divided into …

CMLoot : Find Interesting Files Stored On (System Center) Configuration Manager (SCCM/CM) SMB Shares

CMLoot was created to easily find interesting files stored on System Center Configuration Manager (SCCM/CM) SMB shares. The shares are used for distributing software to Windows clients in Windows enterprise environments and can contains scripts/configuration files with passwords, certificates (pfx), etc. Most SCCM deployments are configured to allow all users to read the files on …

Decider : Process Of Mapping Adversary Behaviors To The MITRE ATT&CK Framework

Decider is a Web Application That Assists Network Defenders, Analysts, And Researcher In The Process Of Mapping Adversary Behaviors To The MITRE ATT&CK Framework. Notifications What is it? The Short A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework. The Long Decider …

How to Secure your Browsers from Malicious Extensions?

In the first half of 2022, 1.3 million users suffered data breaches because of harmful extensions. Malicious extensions are considered major risk factors as they can easily penetrate your endpoints and cause major system compromises. Unsigned and unsafe extensions are considered to be potentially harmful to your browsers. Browser extensions are inherently weak in terms …

NimPlant : A Light-Weight First-Stage C2 Implant Written In Nim

NimPlant is a light first-stage C2 implant written in Nim and Python Feature Overview Instructions Installation Getting Started Configuration Before using NimPlant, create the configuration file config.toml. It is recommended to copy config.toml.example and work from there. An overview of settings is provided below. Category Setting Description server ip The IP that the C2 web …

Gmailc2 : A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic Restrictions

Gmailc2 is a Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions. Note: This RAT communicates Via Gmail SMTP (or u can use any other smtps as well) but Gmail SMTP is valid because most of the companies block unknown traffic so gmail traffic is valid and …

ThreatHound : Tool That Help You On Your IR & Threat Hunting And CA

ThreatHound is a tool will help you on your IR & Threat Hunting & CA. just drop your event log file and anlayze the results. New Release Features: $ ThreatHound.exe -s ..\sigma_rules\ -p C:\Windows\System32\winevt\Logs\ -print no I’ve built the following: Features of the tool: To-do: installiton: $ git clone https://github.com/MazX0p/ThreatHound.git $ cd ThreatHound $ pip …

OffensivePipeline : To Download And Build C# Tools, To Improve Their Evasion For Red Team Exercises

OffensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.A common use of OffensivePipeline is to download a tool from a Git repository, randomise certain values in the project, build it, obfuscate the resulting binary and generate a shellcode. Features What’s new in …