This tool is a C++ staged shellcode loader designed for offensive security operations. It features: 1. Compatibility with Sliver, a popular adversary emulation framework. 2. Ability to ingest shellcode from other sources, including Cobalt Strike. 3. Evasion capabilities to help avoid detection. 4. Support for MTLS (Mutual TLS) communication. 5. Integration with HTTP stage listeners for payload delivery. 6. Cross-platform compilation support, specifically for Windows targets using MinGW. The loader is primarily intended for use with Sliver but can be adapted to work with various shellcode sources. It provides a flexible platform for red team operations and penetration testing, allowing for customized payload delivery and execution.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset
Modular framework for pentesting Modbus protocol with diagnostic and offensive features.
A framework for testing and exploiting race conditions in software
A tool for interacting with Exchange servers remotely and exploiting client-side Outlook features.
Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.
A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.