CalfCrusher / MaccaroniC2Links
A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client and server implementation of the SSHv2 protocol and use PyNgrok wrapper for ngrok integration.
☆76Updated last year
Alternatives and similar repositories for MaccaroniC2
Users that are interested in MaccaroniC2 are comparing it to the libraries listed below
Sorting:
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- ☆27Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆51Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- PoC-Malware-TTPs☆49Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆36Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- ☆35Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 3 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Quicky serve files over http or https using flask.☆35Updated 4 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- ☆54Updated 5 months ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated last year
- Repo for all my exploits/PoCs☆50Updated 3 weeks ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- RCE PoC for Empire C2 framework <5.9.3☆28Updated last year