Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·
β88Feb 22, 2025Updated last year
Alternatives and similar repositories for TelecordC2
Users that are interested in TelecordC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Payload Dropper with Persistance & Privesc & UAC bypass π±βπ€β15Apr 8, 2024Updated 2 years ago
- web based c2 π΄ββ οΈβ15Aug 10, 2024Updated last year
- Persistent Powershell backdoor tool {π}β121Jul 31, 2024Updated last year
- AI web vulneraribilty scanner π€β21Feb 22, 2024Updated 2 years ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.β292May 27, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β62Aug 19, 2024Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.β13Apr 22, 2025Updated last year
- Hide your P/Invoke signatures through other people's signed assembliesβ212Mar 10, 2024Updated 2 years ago
- β18Mar 26, 2024Updated 2 years ago
- File and executable crypter with comprehensible GUI and built-in anti-malicious useβ21Sep 3, 2020Updated 5 years ago
- β109Oct 29, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPackerβ25Mar 12, 2025Updated last year
- Evasive shellcode loaderβ400Oct 17, 2024Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetryβ467Aug 2, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.β126Jul 12, 2024Updated last year
- Simulate the behavior of AV/EDR for malware development training.β567Feb 15, 2024Updated 2 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.β111Mar 10, 2024Updated 2 years ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ130Dec 2, 2023Updated 2 years ago
- A C# port from Invoke-GhostTaskβ120Jan 5, 2024Updated 2 years ago
- EDR & Antivirus Bypass to Gain Shell Accessβ247Sep 30, 2024Updated last year
- A fast Go-based tool to uncover sensitive information in JavaScriptβ37Jul 6, 2025Updated 10 months ago
- Hacking Windows through iTunesβ - Local Privilege Escalation 0-dayβ98Oct 4, 2024Updated last year
- pdf exploit ιζβ247Jul 19, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Dump Linux keyringsβ24Jul 15, 2024Updated last year
- COM ViewLogger β new malware keylogging techniqueβ407Jan 6, 2025Updated last year
- Analyse MSI files for vulnerabilitiesβ143Aug 30, 2024Updated last year
- β320Jul 6, 2022Updated 3 years ago
- PowerShell Obfuscatorβ243Mar 18, 2026Updated last month
- Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )β61Jun 8, 2024Updated last year
- Real fucking shellcode encryptor & obfuscator toolβ1,024Jan 7, 2026Updated 3 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β153May 7, 2024Updated last year
- Parse FFUF results in GUI with option to sort based by response code , size , keywordβ101Sep 9, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Extract and execute a PE embedded within a PNG file using an LNK file.β465Nov 2, 2024Updated last year
- A command and control framework written in rust.β386Apr 27, 2026Updated last week
- ZTE F660 Routers Authentication Bypass Leading to RCE.β19Feb 18, 2024Updated 2 years ago
- Amazing whoami alternativesβ141Mar 23, 2024Updated 2 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β251Jun 11, 2024Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfveβ¦β596Jun 12, 2024Updated last year
- Early Bird APC Injection in Rustβ64Oct 9, 2024Updated last year