IncludeSecurity / c2-vulnerabilitiesLinks
PoCs of RCEs against open source C2 servers
☆91Updated last year
Alternatives and similar repositories for c2-vulnerabilities
Users that are interested in c2-vulnerabilities are comparing it to the libraries listed below
Sorting:
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆200Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- The Official Sliver Armory☆129Updated 9 months ago
- To audit the security of read-only domain controllers☆118Updated 2 years ago
- WSUS Unauthenticated RCE☆170Updated 3 months ago
- ☆222Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- FortiWeb CVE-2025-25257 exploit☆63Updated 6 months ago
- ☆169Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆145Updated 2 years ago
- Chrome browser extension-based Command & Control☆230Updated 7 months ago
- ☆241Updated last year
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆128Updated last year
- Evasive Golang Loader☆137Updated last year
- ☆137Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆89Updated 3 years ago
- Port of Cobalt Strike's Process Inject Kit☆190Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆153Updated 6 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆153Updated last year
- ☆158Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆138Updated 3 years ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆91Updated 8 months ago
- ☆184Updated 3 years ago
- ☆68Updated last year
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆133Updated 2 years ago
- Windows Persistence IT-Security☆109Updated 10 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Updated last year
- Local & remote Windows DLL Proxying☆170Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year