Windows anti-forensics made easy
-
Updated
Mar 6, 2024 - C#
Windows anti-forensics made easy
A Simple Reverse Shell TCP End-To-End Encrypted Made In C#
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
Demo for spawning processes under a specified parent PID.
Proof of concept demo for a tool that listens for keywords, and records audio to a file.
.NET 4.0 Remote Desktop Manager Password Gatherer
Processes used to guard Red Team property against and watch for, unwanted or unexpected blue team actions.
C# C2 Framework centered around Stage 1 operations
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."