JohnHammond / c2c2Links
My new C2 framework
☆40Updated 3 years ago
Alternatives and similar repositories for c2c2
Users that are interested in c2c2 are comparing it to the libraries listed below
Sorting:
- ☆85Updated 3 years ago
- A basic c2 / agent.☆120Updated 5 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- An open-source process injection enumeration tool written in C#☆175Updated 3 years ago
- ☆121Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Updated last year
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- ☆167Updated 3 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 4 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆145Updated 2 years ago
- MOVEit CVE-2023-34362☆139Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆268Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- rcat☆73Updated 3 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Updated 2 years ago
- AV Evasion Techniques☆82Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- ☆184Updated 3 years ago
- ☆239Updated 3 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- CyberSec Blog☆98Updated last week
- ☆94Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆52Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Basic reverse shell in C using socket() with complete explanation☆68Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆110Updated 2 years ago
- ☆90Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago