JohnHammond / c2c2Links
My new C2 framework
☆40Updated 2 years ago
Alternatives and similar repositories for c2c2
Users that are interested in c2c2 are comparing it to the libraries listed below
Sorting:
- ☆85Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆130Updated 8 months ago
- ☆123Updated last year
- PrintNightmare (CVE-2021-34527) PoC Exploit☆112Updated 2 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆140Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆268Updated 2 years ago
- An open-source process injection enumeration tool written in C#☆171Updated 2 years ago
- MOVEit CVE-2023-34362☆138Updated 2 years ago
- A basic c2 / agent.☆119Updated 5 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆98Updated 3 months ago
- Run Your Payload Without Running Your Payload☆181Updated 2 years ago
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- ☆232Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- POC for Veeam Backup and Replication CVE-2023-27532☆64Updated 2 years ago
- Exploit for the CVE-2023-23397☆161Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆23Updated 5 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- ☆99Updated 3 years ago
- ☆184Updated 2 years ago