IncludeSecurity / c2-vulnerabilitiesLinks
PoCs of RCEs against open source C2 servers
☆87Updated last year
Alternatives and similar repositories for c2-vulnerabilities
Users that are interested in c2-vulnerabilities are comparing it to the libraries listed below
Sorting:
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆196Updated 11 months ago
- To audit the security of read-only domain controllers☆117Updated last year
- ☆231Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆142Updated 2 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- The Official Sliver Armory☆118Updated 6 months ago
- ☆219Updated last year
- FortiWeb CVE-2025-25257 exploit☆62Updated 3 months ago
- ☆68Updated 9 months ago
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆129Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆149Updated last year
- Port of Cobalt Strike's Process Inject Kit☆188Updated 10 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆248Updated last year
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- Seamless remote browser session control☆213Updated 3 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆89Updated 5 months ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆250Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- ☆185Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆170Updated 11 months ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year
- ☆89Updated last year
- ☆137Updated last year
- Simple C++ PoC of SeDebugPrivilege Privesc☆26Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆131Updated 2 years ago
- ☆156Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆104Updated last year
- ☆170Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆223Updated last year