Automate your C2 creation with Azure Frontdoor and randomly generated options
☆15Sep 20, 2024Updated last year
Alternatives and similar repositories for Automated-C2
Users that are interested in Automated-C2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Obfuscate the bytes of your payload with an association dictionary☆76Nov 7, 2025Updated 5 months ago
- Bienvenue sur le dépôt GitHub de Hacking-France, le site dédié à la communauté de hacking éthique francophone. Ce projet vise à rassemble…☆12Updated this week
- Privacy-focused browser based on LibreWolf with data poisoning to fight tracker profiling☆33Feb 6, 2026Updated 2 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Jan 23, 2024Updated 2 years ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- ☆10Apr 3, 2023Updated 3 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆62May 3, 2024Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆20May 3, 2022Updated 3 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- A Python3 discord trojan, utilizing discord webhooks for sending information. Silent stealer, meaning this is intended for the person to …☆13Feb 8, 2022Updated 4 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Mythic C2 CheatSheet for OSEP☆64Apr 1, 2026Updated last week
- Simple powershell script to find living off land binaries and scripts on a system.☆22Aug 24, 2019Updated 6 years ago
- A voting bot for Minecraft-Server.eu. Supports proxies and multiple servers and usernames to vote for.☆11Nov 8, 2021Updated 4 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- Strong Python Protector & Obfuscator☆10Oct 23, 2020Updated 5 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- Powershell commands for enumeration in Windows Active Directory environment.☆49Oct 5, 2022Updated 3 years ago
- Reads PE headers and virtual memory from file or buffer in Java☆23Jul 31, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆10Sep 10, 2024Updated last year
- Sources des exemples du livre Ansible☆18Apr 25, 2023Updated 2 years ago
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆20Sep 15, 2024Updated last year
- A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)☆10Jul 12, 2024Updated last year
- VaporObfuscator is an obfuscator for .net made with dnlib☆12May 1, 2020Updated 5 years ago
- Attack chain emulator. Write recipes for initial access easily☆22Feb 26, 2025Updated last year
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆29Oct 2, 2024Updated last year
- DPX - the Doge Packer for eXecutables☆30Dec 21, 2021Updated 4 years ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆13Aug 19, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Timed shut down of your Windows PC☆13Oct 19, 2025Updated 5 months ago
- Root module for creating Tier Model / Delegation Model on Active Directory☆20Aug 28, 2025Updated 7 months ago
- CTFd plugin allowing for individual Docker containers per team☆24Jan 15, 2026Updated 2 months ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Mar 30, 2026Updated last week
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- v2.48☆15Jun 21, 2025Updated 9 months ago
- A Discord token grabber (grabs wallets, passwords, cookies, discord etc.)☆10Sep 29, 2022Updated 3 years ago