ELMERIKH / TelecordC2Links
Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·
β84Updated 9 months ago
Alternatives and similar repositories for TelecordC2
Users that are interested in TelecordC2 are comparing it to the libraries listed below
Sorting:
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)β41Updated 9 months ago
- Repo for all my exploits/PoCsβ53Updated 7 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β112Updated 2 years ago
- Auto exploitation tool for CVE-2024-24401.β36Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromisβ¦β122Updated last year
- CHAOS RAT web panel path RCE PoCβ30Updated last year
- Smart keylogging capability to steal SSH Credentials including password & Private Keyβ147Updated 8 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.β45Updated 3 months ago
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated last year
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.β102Updated 5 months ago
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β158Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ54Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious processβ72Updated last year
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and β¦β85Updated 2 weeks ago
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Serverβ38Updated last year
- GeoServer Remote Code Executionβ85Updated 8 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated last year
- RCE through a race condition in Apache Tomcatβ56Updated 11 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)β83Updated last year
- tomcat CVE-2024-50379/CVE-2024-56337 ζ‘δ»Άη«δΊζδ»ΆδΈδΌ expβ85Updated 11 months ago
- CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Informationβ32Updated last year
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).β66Updated last month
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerabilityβ42Updated 3 years ago
- Golang tool to help in forcing a license for HAK5 C2 Toolβ52Updated last year
- Gmail/GSuite account enumeration toolβ54Updated last year
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Executionβ78Updated last year
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692β42Updated 8 months ago
- Proof of Concept Exploit for CVE-2024-9464β45Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ49Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated last year