Uses Shodan API to pull down C2 servers to run known exploits on them.
☆18Dec 9, 2017Updated 8 years ago
Alternatives and similar repositories for C2-Pwn
Users that are interested in C2-Pwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jun 1, 2022Updated 3 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆46Jan 26, 2019Updated 7 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆22Sep 18, 2023Updated 2 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Jul 23, 2019Updated 6 years ago
- ☆10May 12, 2017Updated 8 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- just a python script for cve-2017-12615☆11Oct 1, 2017Updated 8 years ago
- Homo Network - The best ddos botnet in 2023☆13Apr 27, 2023Updated 2 years ago
- This script make any windows compatible with RDP connection☆21Jul 28, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆15Sep 4, 2019Updated 6 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Apr 20, 2014Updated 11 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- uploads unlimited files to mega.nz without a subscription☆12Mar 19, 2026Updated last week
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- sap netweaver 0day poc by shinyhunters (scattered lapsus$ hunters) affecting all 7.x CVE-2025-31324☆20Aug 15, 2025Updated 7 months ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆15Nov 20, 2025Updated 4 months ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143May 30, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Crack encrypted master Key and ckey of a bitcoin wallet(POC)☆18Sep 1, 2022Updated 3 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- pure python remote adb scanner + nmap scan module☆22Dec 7, 2018Updated 7 years ago
- A small SSH server written in Go that checks for weak SSH keys☆14Feb 26, 2016Updated 10 years ago
- ☆21Jul 10, 2017Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Nov 26, 2017Updated 8 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆27Jun 25, 2014Updated 11 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- ☆51Feb 5, 2014Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- ☆28Aug 2, 2017Updated 8 years ago
- Show the marketplace profile from FB☆14May 4, 2022Updated 3 years ago
- MASS CVE-2021-41773☆29Nov 14, 2023Updated 2 years ago
- ☆27Aug 19, 2015Updated 10 years ago
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆15Dec 18, 2023Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago