☆13Nov 29, 2024Updated last year
Alternatives and similar repositories for C2-Server
Users that are interested in C2-Server are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Apr 17, 2026Updated last week
- a powerful tool designed to automate the detection of Server-Side Request Forgery (SSRF) and Open Redirect vulnerabilities☆22Oct 15, 2024Updated last year
- Created by the one and only M.M.☆21Dec 1, 2024Updated last year
- Port scanning is crucial in recon, but running it manually on big scopes? Nope. That’s why I made Nmap Bomber a Python script that runs f…☆41Jul 31, 2025Updated 9 months ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆11Nov 5, 2018Updated 7 years ago
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Nov 21, 2019Updated 6 years ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- KeePass 2.X dumper (CVE-2023-32784)☆27Nov 4, 2023Updated 2 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- ☆28Aug 21, 2024Updated last year
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Aug 14, 2020Updated 5 years ago
- ☆27Mar 17, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- My mobile writeups repository☆30Nov 19, 2025Updated 5 months ago
- PHP 8.1.0-dev Backdoor System Shell Script☆94Jun 6, 2021Updated 4 years ago
- ☆29Feb 16, 2022Updated 4 years ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆29Oct 19, 2023Updated 2 years ago
- CVE-2024-21413 PoC for THM Lab☆239Mar 13, 2024Updated 2 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.☆22Aug 31, 2023Updated 2 years ago
- A python library for reading and analyzing Flipper Zero raw RFID files (tag.[ap]sk.raw)☆51Oct 25, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆29May 25, 2021Updated 4 years ago
- Python exploit for the vsftpd 2.3.4☆25Jul 24, 2024Updated last year
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- ☆36Nov 30, 2023Updated 2 years ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆31Mar 18, 2025Updated last year
- ☆34Apr 16, 2022Updated 4 years ago
- Python tool for enumerating directories and files on web servers that contain a publicly readable .ds_store file.☆70Oct 29, 2021Updated 4 years ago
- The Certified in Cybersecurity℠ (CC) is for anyone interested in gaining a basic understanding of cybersecurity concepts. This is an ent…☆27Mar 22, 2025Updated last year
- This is a cheatsheet of commands and processes to compromise an Active Directory environment. Everything documented in this repository is…☆27May 18, 2025Updated 11 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool for extracting credentials locally stored by web browsers☆37Jun 25, 2022Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- Code injection via Asynchronous Procedure Calls to bypass Windows defenses. Mapped to MITRE ATT&CK T1055.004.(Process Injection: Asynchro…☆34Oct 11, 2024Updated last year
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- Exploits I've authored☆60Aug 13, 2019Updated 6 years ago
- ☆34Nov 3, 2020Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year