JohnHammond / c2c2
My new C2 framework
☆40Updated 2 years ago
Alternatives and similar repositories for c2c2:
Users that are interested in c2c2 are comparing it to the libraries listed below
- ☆84Updated 2 years ago
- MOVEit CVE-2023-34362☆139Updated last year
- Crappy Golang code to list local listening ports and their associated processes.☆30Updated last year
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆85Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- rcat☆67Updated 3 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆31Updated last year
- ☆121Updated last year
- Repo for all my exploits/PoCs☆50Updated last month
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- ☆106Updated 4 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- A collection of red blue team staff☆46Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆135Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆128Updated 4 months ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆76Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated last month
- Windows Privilege Escalation☆56Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year
- PowerShell Reverse Shell☆61Updated last year
- ☆64Updated 11 months ago
- ☆12Updated 4 years ago
- My Favorite Offensive Security Scripts☆69Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆41Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆75Updated 6 months ago
- A curated list of resources for the OSED journey.☆60Updated 3 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆145Updated last year
- Hades Basic Command & Control Server☆88Updated last year