A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
-
Updated
Apr 8, 2023 - C#
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
C# C2 Framework centered around Stage 1 operations
.NET 4.0 Remote Desktop Manager Password Gatherer
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
Proof of concept demo for a tool that listens for keywords, and records audio to a file.
Processes used to guard Red Team property against and watch for, unwanted or unexpected blue team actions.
Demo for spawning processes under a specified parent PID.
A Simple Reverse Shell TCP End-To-End Encrypted Made In C#
Windows anti-forensics made easy
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."