A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client and server implementation of the SSHv2 protocol and use PyNgrok wrapper for ngrok integration.
☆75Jun 27, 2023Updated 2 years ago
Alternatives and similar repositories for MaccaroniC2
Users that are interested in MaccaroniC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Command & Control-Framework created for collaboration in python3☆324Aug 7, 2023Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆132Nov 5, 2024Updated last year
- A Command and Control (C2)☆302May 4, 2023Updated 2 years ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆331Jul 15, 2024Updated last year
- Nimbo-C2 is yet another (simple and lightweight) C2 framework☆443Jan 29, 2026Updated 2 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- ☆39May 20, 2023Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- ☆18Oct 28, 2025Updated 5 months ago
- A C# Command & Control framework☆1,030Mar 28, 2024Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆115May 19, 2023Updated 2 years ago
- A command and control (C2) server☆60Jul 5, 2024Updated last year
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆506Dec 19, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆17Jun 28, 2023Updated 2 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆480Sep 17, 2025Updated 7 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65May 1, 2023Updated 2 years ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆203Jun 23, 2023Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 3 months ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆224Oct 22, 2023Updated 2 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Apr 18, 2023Updated 3 years ago
- Go shellcode loader that combines multiple evasion techniques☆388Jun 21, 2023Updated 2 years ago
- Reverse shell that can bypass windows defender detection☆173Mar 31, 2026Updated 2 weeks ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Mar 30, 2022Updated 4 years ago
- Execute shellcode files with rundll32☆218Jan 28, 2024Updated 2 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆273Jan 18, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 10 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 3 months ago
- Weaponized HellsGate/SigFlip☆207Jun 7, 2023Updated 2 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆162Feb 22, 2024Updated 2 years ago
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆165Jun 29, 2023Updated 2 years ago