IncludeSecurity / c2-vulnerabilitiesLinks
PoCs of RCEs against open source C2 servers
☆86Updated 10 months ago
Alternatives and similar repositories for c2-vulnerabilities
Users that are interested in c2-vulnerabilities are comparing it to the libraries listed below
Sorting:
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆196Updated 8 months ago
- To audit the security of read-only domain controllers☆117Updated last year
- ☆158Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆75Updated 10 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆143Updated 6 months ago
- ☆68Updated 6 months ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- ☆220Updated last year
- The Official Sliver Armory☆112Updated 3 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆140Updated 2 years ago
- ☆136Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆150Updated 10 months ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- Exploit for the CVE-2023-23397☆161Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆132Updated last year
- ☆228Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆84Updated 2 months ago
- ☆167Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Updated 9 months ago
- Seamless remote browser session control☆173Updated 3 weeks ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Updated 3 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago
- Port of Cobalt Strike's Process Inject Kit☆181Updated 8 months ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆211Updated last year
- ☆185Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆112Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆115Updated 3 years ago
- ☆164Updated last year
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆125Updated 2 years ago
- Execute shellcode files with rundll32☆207Updated last year