IncludeSecurity / c2-vulnerabilitiesLinks
PoCs of RCEs against open source C2 servers
☆87Updated last year
Alternatives and similar repositories for c2-vulnerabilities
Users that are interested in c2-vulnerabilities are comparing it to the libraries listed below
Sorting:
- WSUS Unauthenticated RCE☆152Updated 2 weeks ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆196Updated last year
- To audit the security of read-only domain controllers☆118Updated last year
- The Official Sliver Armory☆118Updated 6 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- ☆219Updated last year
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆129Updated last year
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- FortiWeb CVE-2025-25257 exploit☆62Updated 4 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆151Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆106Updated last year
- Execute shellcode files with rundll32☆210Updated last year
- Simple C++ PoC of SeDebugPrivilege Privesc☆26Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- Port of Cobalt Strike's Process Inject Kit☆188Updated 11 months ago
- ☆233Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆89Updated 5 months ago
- ☆170Updated last year
- Evasive Golang Loader☆138Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆129Updated 3 years ago
- Chrome browser extension-based Command & Control☆196Updated 4 months ago
- ☆184Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆248Updated last year
- ☆157Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆142Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Updated last year
- ☆163Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆107Updated 2 years ago