A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in text chats.
☆133Nov 5, 2024Updated last year
Alternatives and similar repositories for DCVC2
Users that are interested in DCVC2 are comparing it to the libraries listed below
Sorting:
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆389Jun 21, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- ErebusGate for Nim Bypass AV/EDR☆162Nov 7, 2022Updated 3 years ago
- Analyse your malware to surgically obfuscate it☆519Dec 17, 2025Updated 2 months ago
- Tool for efficient directory enumeration☆65Jan 27, 2026Updated last month
- A sock, with a wire, so you can tunnel all you desire.☆295Jan 19, 2024Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 3 years ago
- Python module for running BOFs☆79Nov 28, 2025Updated 3 months ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago
- ☆223Oct 22, 2023Updated 2 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Single executable reverse SOCKS5 proxy written in Golang.☆147Oct 27, 2025Updated 4 months ago
- Modular C2 server to tame your pack of wolves☆22Updated this week
- Command & Control-Framework created for collaboration in python3☆322Aug 7, 2023Updated 2 years ago
- Patch AMSI and ETW☆249May 8, 2024Updated last year
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆503Dec 19, 2023Updated 2 years ago
- ☆223Mar 10, 2024Updated last year
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Feb 18, 2026Updated last week
- ☆215Feb 20, 2026Updated last week
- A PoC project for embedding shellcode to Hint/Name Table☆113May 16, 2022Updated 3 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- indirect syscalls for AV/EDR evasion in Go assembly☆371Jun 13, 2023Updated 2 years ago
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- Weaponized HellsGate/SigFlip☆203Jun 7, 2023Updated 2 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆235Jan 28, 2022Updated 4 years ago
- Beacon Object Files for roasting Active Directory☆235Feb 21, 2022Updated 4 years ago
- EternalHush - java-based open-source c2 framework that targets Microsoft Windows☆21Feb 10, 2026Updated 2 weeks ago
- A quick example of the Hells Gate technique in Nim☆94Aug 11, 2021Updated 4 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆179Feb 14, 2023Updated 3 years ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆382Nov 2, 2023Updated 2 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆201Jun 25, 2024Updated last year