ELMERIKH / TelecordC2Links
Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·
β82Updated 8 months ago
Alternatives and similar repositories for TelecordC2
Users that are interested in TelecordC2 are comparing it to the libraries listed below
Sorting:
- CHAOS RAT web panel path RCE PoCβ29Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated last year
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β158Updated 2 years ago
- Smart keylogging capability to steal SSH Credentials including password & Private Keyβ145Updated 7 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β110Updated 2 years ago
- A lightweight, modular Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).β61Updated last week
- Auto exploitation tool for CVE-2024-24401.β36Updated last year
- GeoServer Remote Code Executionβ82Updated 6 months ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerabilityβ42Updated 3 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromisβ¦β122Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ53Updated last year
- Repo for all my exploits/PoCsβ53Updated 5 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.β46Updated 2 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)β83Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ101Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated last year
- RCE through a race condition in Apache Tomcatβ56Updated 10 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ49Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious processβ72Updated last year
- POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692β42Updated 7 months ago
- Dump Windows SAM hashesβ42Updated 2 years ago
- Bruteforces Fortinet SSL VPNsβ57Updated 2 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.β54Updated 2 years ago
- tomcat CVE-2024-50379/CVE-2024-56337 ζ‘δ»Άη«δΊζδ»ΆδΈδΌ expβ85Updated 10 months ago
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Executionβ76Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β118Updated 4 months ago
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.β42Updated last year
- A command and control framework.β55Updated 10 months ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the β¦β73Updated 2 years ago