S3N4T0R-0X0
specialization in Adversary Simulation , Malware Dev & Red Team Activates , passionate about all things related to Cyber Security
Pinned Repositories
AM0N-Eye
AM0N-Eye is the decompiled from Cobaltsetrike and has been modified and developed through several aggressor scripts & BOF is project based on a combination of different ideas and projects used by the threat actor where we observe a set of techniques to evasion EDR and AV while allowing the operator to continue using the tools
Checkmate
payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter
Diablo
This script is a basic implementation of a C2 (Command-and-Control) connecting to a AM0N-Eye client that connects to a remote server specified by the IP address and port number provided as command-line arguments. Once connected, the client receives a payload of executable code from the server and executes it.
Initial-Registry
It is a registry file that performs malicious activities when the fresh button is pressed, Such as start a malicious link, making an execution for payload, or running a malicious command line in CMD or PowerShell
Jicop-H00k
contains the core files required to create a Beacon Object File (BOF) for use with AM0N-Eye. BOFs are compiled C programs written in a specific convention that allows them to execute within a Beacon process and use internal Beacon APIs. BOFs provide a fast and efficient way to extend the Beacon
Marionette
contains a C code snippet that can be used to connect to an AM0N-Eye and Cobalt Strike beacon using a TCP socket on Linux.
Matryoshka
This repository contains a C++ program that can be used to simulate malware that exploits the messaging platforms Telegram or Discord to achieve its programmed goals. In this case, the program exploits "Maga" to dump data
S3N4T0R-0X0
RedTeam
S3N4T0R-0X0's Repositories
S3N4T0R-0X0/Checkmate
payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter
S3N4T0R-0X0/AM0N-Eye
AM0N-Eye is the decompiled from Cobaltsetrike and has been modified and developed through several aggressor scripts & BOF is project based on a combination of different ideas and projects used by the threat actor where we observe a set of techniques to evasion EDR and AV while allowing the operator to continue using the tools
S3N4T0R-0X0/Initial-Registry
It is a registry file that performs malicious activities when the fresh button is pressed, Such as start a malicious link, making an execution for payload, or running a malicious command line in CMD or PowerShell
S3N4T0R-0X0/Jicop-H00k
contains the core files required to create a Beacon Object File (BOF) for use with AM0N-Eye. BOFs are compiled C programs written in a specific convention that allows them to execute within a Beacon process and use internal Beacon APIs. BOFs provide a fast and efficient way to extend the Beacon
S3N4T0R-0X0/Diablo
This script is a basic implementation of a C2 (Command-and-Control) connecting to a AM0N-Eye client that connects to a remote server specified by the IP address and port number provided as command-line arguments. Once connected, the client receives a payload of executable code from the server and executes it.
S3N4T0R-0X0/Matryoshka
This repository contains a C++ program that can be used to simulate malware that exploits the messaging platforms Telegram or Discord to achieve its programmed goals. In this case, the program exploits "Maga" to dump data
S3N4T0R-0X0/Marionette
contains a C code snippet that can be used to connect to an AM0N-Eye and Cobalt Strike beacon using a TCP socket on Linux.
S3N4T0R-0X0/AMON-Eye
AM0N-Eye is the decompiled from Cobaltsetrike and has been modified and developed through several aggressor scripts. is project based on a combination of different ideas and projects used by the threat actor where we observe a set of techniques to evasion EDR and AV
S3N4T0R-0X0/S3N4T0R-0X0