3NailsInfoSec / DCVC2
A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in text chats.
☆128Updated 4 months ago
Alternatives and similar repositories for DCVC2:
Users that are interested in DCVC2 are comparing it to the libraries listed below
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- ☆106Updated 4 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated last year
- Rust in-memory dumper☆106Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 10 months ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated last year
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆93Updated 3 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆65Updated this week
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆151Updated last year
- (Demo) 3rd party agent for Havoc☆136Updated last year
- ☆155Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆137Updated 8 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- 「💀」Proof of concept on BYOVD attack☆155Updated 3 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- Command and Control (C2) framework☆126Updated 11 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆135Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookie☆192Updated 11 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆219Updated last year
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆74Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆107Updated 2 months ago
- ACL abuse swiss-knife☆119Updated 2 years ago