JohnHammond / c2c2Links
My new C2 framework
☆40Updated 3 years ago
Alternatives and similar repositories for c2c2
Users that are interested in c2c2 are comparing it to the libraries listed below
Sorting:
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆135Updated last year
- A basic c2 / agent.☆119Updated 5 years ago
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- ☆84Updated 3 years ago
- MOVEit CVE-2023-34362☆138Updated 2 years ago
- An open-source process injection enumeration tool written in C#☆174Updated 2 years ago
- ☆122Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆117Updated 2 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆142Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- Red Teaming / Pentesting challenges for my Advent-Of-Code 2021.☆104Updated 3 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 4 years ago
- random code snippets, useful for getting started☆121Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- CyberSec Blog☆97Updated 3 weeks ago
- ☆86Updated last year
- Windows Privilege Escalation☆69Updated 3 years ago
- A shellcode injection tool showcasing various process injection techniques☆136Updated last year
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 3 years ago
- ☆165Updated 3 years ago
- AV Evasion Techniques☆80Updated 3 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 9 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆107Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- ☆38Updated 2 years ago