A modular command and control framework with randomized request chunking for IDS evasion. Designed to be educational, open source, and simpler than Mythic C2.
Bypass Yara Rule Windows_Trojan_CobaltStrike_f0b627fc by randomizing its shellcode signature using a Python script.
Learn how to make your malware appear as legitimate software by adding an icon to your malware, and copying file properties from real programs.
A shellcode loader with advanced techniques such as HellHall's indirect syscalls, Early Bird APC injection, and more, to evade EDR detection.