3NailsInfoSec / DCVC2
A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in text chats.
☆125Updated 3 months ago
Alternatives and similar repositories for DCVC2:
Users that are interested in DCVC2 are comparing it to the libraries listed below
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆62Updated 10 months ago
- Rust in-memory dumper☆105Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Easy red team phishing with Puppeteer☆127Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆104Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆135Updated 6 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆79Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆68Updated 4 months ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆134Updated 11 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆84Updated 3 weeks ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆92Updated 2 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last year
- C2 Automation using Linode☆80Updated 2 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆88Updated 8 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆105Updated 3 months ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated last year
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆122Updated 7 months ago
- ☆26Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆161Updated 11 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Just another C2 Redirector using CloudFlare.☆86Updated 9 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- Command and Control (C2) framework☆124Updated 10 months ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago
- ACL abuse swiss-knife☆119Updated 2 years ago