Alt-Beacon-Payload
Beacon payload
Creates a custom C# beacon payload with AV bypass and shellcode injection capabilities
Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github.com/RCStep/CSSG.
20 stars
3 watching
8 forks
Language: C#
last commit: over 4 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| | Reverse engineering and modification of beacon.dll for 64-bit compatibility | 137 |
| | A collection of payloads designed to exploit vulnerabilities in large language models. | 70 |
| | Lists examples and types of XML external entity injection payloads and attacks | 1,110 |
| | A hands-on workshop teaching developers how to write custom C# payloads for backdoors and command and control frameworks | 1,116 |
| | A proof-of-concept project demonstrating how to mask Beacon's payload execution in Cobalt Strike while executing a user-provided BOF. | 110 |
| | Utilities for Cobalt Strike's Beacon Object Files to simplify working with shellcode and system processes | 112 |
| | Automated notifications via WeChat Serveré…± for CobaltStrike beacons | 44 |
| | A tool for detecting and responding to potential Cobalt Strike beacons using Extended Trace Record (ETW) tracing | 482 |
| | A PowerShell payload designed to evade detection and execute malicious commands on a target system | 108 |
| | Bypassing memory scanning to evade detection by the Karbenz CASB (Content Awareness Security Platform) security solution | 24 |
| | Tools and techniques to bypass Windows UAC restrictions on executable files by utilizing DCOM objects | 119 |
| | A cross-platform .NET Standard library for managing Bluetooth Beacons and parsing their information packages | 210 |
| | A list of examples and explanations for protecting against open redirect vulnerabilities in web applications. | 541 |
| | Tools for creating and deploying steganographic payloads to compromise network targets | 362 |