Automate your C2 creation with Azure Frontdoor and randomly generated options
☆15Sep 20, 2024Updated last year
Alternatives and similar repositories for Automated-C2
Users that are interested in Automated-C2 are comparing it to the libraries listed below
Sorting:
- Obfuscate the bytes of your payload with an association dictionary☆74Nov 7, 2025Updated 4 months ago
- Bienvenue sur le dépôt GitHub de Hacking-France, le site dédié à la communauté de hacking éthique francophone. Ce projet vise à rassemble…☆12Updated this week
- Privacy-focused browser based on LibreWolf with data poisoning to fight tracker profiling☆35Feb 6, 2026Updated last month
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Jan 23, 2024Updated 2 years ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 7 months ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Mythic C2 CheatSheet for OSEP☆62Jan 21, 2026Updated last month
- ☆10Apr 3, 2023Updated 2 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆20May 3, 2022Updated 3 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- A Python3 discord trojan, utilizing discord webhooks for sending information. Silent stealer, meaning this is intended for the person to …☆13Feb 8, 2022Updated 4 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Simple powershell script to find living off land binaries and scripts on a system.☆22Aug 24, 2019Updated 6 years ago
- A voting bot for Minecraft-Server.eu. Supports proxies and multiple servers and usernames to vote for.☆11Nov 8, 2021Updated 4 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- Strong Python Protector & Obfuscator☆10Oct 23, 2020Updated 5 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- Powershell commands for enumeration in Windows Active Directory environment.☆49Oct 5, 2022Updated 3 years ago
- Reads PE headers and virtual memory from file or buffer in Java☆23Jul 31, 2023Updated 2 years ago
- ☆10Sep 10, 2024Updated last year
- Sources des exemples du livre Ansible☆18Apr 25, 2023Updated 2 years ago
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆20Sep 15, 2024Updated last year
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- VaporObfuscator is an obfuscator for .net made with dnlib☆12May 1, 2020Updated 5 years ago
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆29Oct 2, 2024Updated last year
- DPX - the Doge Packer for eXecutables☆30Dec 21, 2021Updated 4 years ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆13Aug 19, 2022Updated 3 years ago
- Timed shut down of your Windows PC☆13Oct 19, 2025Updated 5 months ago
- Root module for creating Tier Model / Delegation Model on Active Directory☆20Aug 28, 2025Updated 6 months ago
- CTFd plugin allowing for individual Docker containers per team☆24Jan 15, 2026Updated 2 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Updated this week
- v2.48☆15Jun 21, 2025Updated 8 months ago
- ☆15Apr 10, 2025Updated 11 months ago
- https://github.com/infosecn1nja/AD-Attack-Defense☆16Jan 22, 2022Updated 4 years ago