JohnHammond / c2c2Links
My new C2 framework
☆40Updated 3 years ago
Alternatives and similar repositories for c2c2
Users that are interested in c2c2 are comparing it to the libraries listed below
Sorting:
- MOVEit CVE-2023-34362☆138Updated 2 years ago
- ☆122Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- ☆84Updated 3 years ago
- An open-source process injection enumeration tool written in C#☆174Updated 2 years ago
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆135Updated last year
- rcat☆72Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 4 years ago
- A basic c2 / agent.☆119Updated 5 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆143Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆269Updated 2 years ago
- ☆239Updated 3 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Updated 2 years ago
- ☆44Updated 3 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆163Updated 2 years ago
- Upload files done during my research.☆167Updated last week
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- ☆90Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆128Updated 2 weeks ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 10 months ago
- CyberSec Blog☆98Updated this week
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- Easy red team phishing with Puppeteer☆133Updated 2 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 4 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆70Updated 2 years ago