A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in text chats.
☆131Nov 5, 2024Updated last year
Alternatives and similar repositories for DCVC2
Users that are interested in DCVC2 are comparing it to the libraries listed below
Sorting:
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆388Jun 21, 2023Updated 2 years ago
- ErebusGate for Nim Bypass AV/EDR☆161Nov 7, 2022Updated 3 years ago
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆324Jun 18, 2023Updated 2 years ago
- Analyse your malware to surgically obfuscate it☆524Dec 17, 2025Updated 3 months ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin …☆535Aug 1, 2022Updated 3 years ago
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated last month
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated 2 years ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- A sock, with a wire, so you can tunnel all you desire.☆297Jan 19, 2024Updated 2 years ago
- ☆223Mar 10, 2024Updated 2 years ago
- Command & Control-Framework created for collaboration in python3☆322Aug 7, 2023Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆252Mar 7, 2022Updated 4 years ago
- Discord C2 Profile for Mythic☆32Feb 18, 2025Updated last year
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆384Nov 2, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆898Mar 11, 2026Updated last week
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,008Jun 4, 2024Updated last year
- ☆15Jul 20, 2022Updated 3 years ago
- indirect syscalls for AV/EDR evasion in Go assembly☆379Jun 13, 2023Updated 2 years ago
- ☆477Nov 20, 2022Updated 3 years ago
- A quick example of the Hells Gate technique in Nim☆93Aug 11, 2021Updated 4 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- RunPE implementation with multiple evasive techniques (1)☆383Sep 22, 2023Updated 2 years ago
- Patch AMSI and ETW☆250May 8, 2024Updated last year
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆246Feb 23, 2022Updated 4 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆234Jan 28, 2022Updated 4 years ago
- Reflective DLL Injection Made Bella☆251Jan 6, 2025Updated last year
- Single executable reverse SOCKS5 proxy written in Golang.☆148Oct 27, 2025Updated 4 months ago
- grim reaper c2☆346Nov 19, 2022Updated 3 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆620Sep 26, 2023Updated 2 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆505Dec 19, 2023Updated 2 years ago