Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·
β88Feb 22, 2025Updated last year
Alternatives and similar repositories for TelecordC2
Users that are interested in TelecordC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Payload Dropper with Persistance & Privesc & UAC bypass π±βπ€β15Apr 8, 2024Updated 2 years ago
- web based c2 π΄ββ οΈβ15Aug 10, 2024Updated last year
- Persistent Powershell backdoor tool {π}β121Jul 31, 2024Updated last year
- AI web vulneraribilty scanner π€β20Feb 22, 2024Updated 2 years ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.β291May 27, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β62Aug 19, 2024Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.β13Apr 22, 2025Updated 11 months ago
- Hide your P/Invoke signatures through other people's signed assembliesβ210Mar 10, 2024Updated 2 years ago
- Bypass EDR(Endpoint Detection and Response) environment to write Behinder jsp webshell onto webserverβ13Dec 27, 2023Updated 2 years ago
- β18Mar 26, 2024Updated 2 years ago
- File and executable crypter with comprehensible GUI and built-in anti-malicious useβ21Sep 3, 2020Updated 5 years ago
- β108Oct 29, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPackerβ25Mar 12, 2025Updated last year
- Evasive shellcode loaderβ400Oct 17, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetryβ462Aug 2, 2024Updated last year
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.β126Jul 12, 2024Updated last year
- Simulate the behavior of AV/EDR for malware development training.β565Feb 15, 2024Updated 2 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.β111Mar 10, 2024Updated 2 years ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ130Dec 2, 2023Updated 2 years ago
- EDR & Antivirus Bypass to Gain Shell Accessβ246Sep 30, 2024Updated last year
- A C# port from Invoke-GhostTaskβ120Jan 5, 2024Updated 2 years ago
- A fast Go-based tool to uncover sensitive information in JavaScriptβ37Jul 6, 2025Updated 9 months ago
- Hacking Windows through iTunesβ - Local Privilege Escalation 0-dayβ98Oct 4, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- pdf exploit ιζβ247Jul 19, 2024Updated last year
- Dump Linux keyringsβ24Jul 15, 2024Updated last year
- COM ViewLogger β new malware keylogging techniqueβ407Jan 6, 2025Updated last year
- Analyse MSI files for vulnerabilitiesβ142Aug 30, 2024Updated last year
- β319Jul 6, 2022Updated 3 years ago
- PowerShell Obfuscatorβ241Mar 18, 2026Updated 3 weeks ago
- Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )β61Jun 8, 2024Updated last year
- Real fucking shellcode encryptor & obfuscator toolβ1,018Jan 7, 2026Updated 3 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β154May 7, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Parse FFUF results in GUI with option to sort based by response code , size , keywordβ101Sep 9, 2024Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.β466Nov 2, 2024Updated last year
- A command and control framework written in rust.β386Sep 4, 2025Updated 7 months ago
- Amazing whoami alternativesβ141Mar 23, 2024Updated 2 years ago
- ZTE F660 Routers Authentication Bypass Leading to RCE.β19Feb 18, 2024Updated 2 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β250Jun 11, 2024Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfveβ¦β591Jun 12, 2024Updated last year