IncludeSecurity / c2-vulnerabilitiesLinks
PoCs of RCEs against open source C2 servers
☆89Updated last year
Alternatives and similar repositories for c2-vulnerabilities
Users that are interested in c2-vulnerabilities are comparing it to the libraries listed below
Sorting:
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆200Updated last year
- To audit the security of read-only domain controllers☆118Updated 2 years ago
- ☆222Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆89Updated 3 years ago
- WSUS Unauthenticated RCE☆167Updated 2 months ago
- FortiWeb CVE-2025-25257 exploit☆63Updated 6 months ago
- ☆184Updated 3 years ago
- The Official Sliver Armory☆125Updated 9 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆144Updated 2 years ago
- ☆238Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆153Updated last year
- ☆136Updated 2 years ago
- Port of Cobalt Strike's Process Inject Kit☆190Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆138Updated 3 years ago
- Evasive Golang Loader☆137Updated last year
- ☆169Updated last year
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆128Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆153Updated 5 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆115Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆110Updated 2 years ago
- Weaponized HellsGate/SigFlip☆205Updated 2 years ago
- ☆158Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆172Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆149Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆89Updated 7 months ago
- ☆161Updated 2 years ago