Ignitetechnologies / Command-ControlLinks
This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploit remote session.
☆83Updated 5 years ago
Alternatives and similar repositories for Command-Control
Users that are interested in Command-Control are comparing it to the libraries listed below
Sorting:
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- Notes only☆20Updated 3 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆34Updated 4 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Updated 5 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- ☆32Updated 4 years ago
- ☆140Updated 3 years ago
- Repository to put my notes related to OSCP certification☆20Updated 6 years ago
- ☆75Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆97Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆79Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆50Updated 4 years ago
- Web Hacking and Red Teaming MindMap☆78Updated 3 weeks ago
- ☆45Updated 4 years ago
- ☆48Updated 7 years ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆84Updated 3 months ago
- ☆18Updated 4 years ago
- ☆50Updated 5 years ago
- Attack Surface Discovery Tool☆110Updated last year
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- ☆29Updated 4 years ago
- ☆65Updated 2 years ago
- ☆29Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- blue team, red team stuff. All things cyber ;)☆78Updated 6 months ago
- New Framework Red Team Operations☆19Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- MayorSec DNS Enumeration Tool☆89Updated last year