Automate your C2 creation with Azure Frontdoor and randomly generated options
☆15Sep 20, 2024Updated last year
Alternatives and similar repositories for Automated-C2
Users that are interested in Automated-C2 are comparing it to the libraries listed below
Sorting:
- Obfuscate the bytes of your payload with an association dictionary☆75Nov 7, 2025Updated 3 months ago
- Bienvenue sur le dépôt GitHub de Hacking-France, le site dédié à la communauté de hacking éthique francophone. Ce projet vise à rassemble…☆12Updated this week
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Jan 23, 2024Updated 2 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆16Nov 24, 2023Updated 2 years ago
- ☆10Apr 3, 2023Updated 2 years ago
- ☆10Sep 10, 2024Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Powershell commands for enumeration in Windows Active Directory environment.☆48Oct 5, 2022Updated 3 years ago
- A web application based on Python framework Django , that brings together farmers and retailers on common platform for commodity bidding.☆10Oct 21, 2019Updated 6 years ago
- Privacy-focused browser based on LibreWolf with data poisoning to fight tracker profiling☆33Feb 6, 2026Updated 3 weeks ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 7 months ago
- ☆28Feb 20, 2026Updated last week
- Sources des exemples du livre Ansible☆19Apr 25, 2023Updated 2 years ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- Strong Python Protector & Obfuscator☆10Oct 23, 2020Updated 5 years ago
- ☆16Oct 2, 2024Updated last year
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆13Aug 19, 2022Updated 3 years ago
- Sample architecture on how to implement a "Proxy Login" function using Okta☆16Oct 14, 2019Updated 6 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 8 months ago
- v2.48☆15Jun 21, 2025Updated 8 months ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆21Updated this week
- ☆15Apr 10, 2025Updated 10 months ago
- A Proof of Concept for CVE-2023-50564 vulnerability in Pluck CMS version 4.7.18☆19Feb 9, 2026Updated 2 weeks ago
- A Python3 discord trojan, utilizing discord webhooks for sending information. Silent stealer, meaning this is intended for the person to …☆13Feb 8, 2022Updated 4 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- Blowfish Template☆18Feb 11, 2026Updated 2 weeks ago
- ☆13Sep 8, 2023Updated 2 years ago
- Machines, Sherlocks, Challenges, Season III,IV☆15Apr 17, 2024Updated last year
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- ⛳️ PASS: Microsoft SC-900 (Microsoft Security, Compliance, and Identity Fundamentals) by learning based on our Questions & Answers (Q&A) …☆18Oct 25, 2025Updated 4 months ago
- VolchockC2 is a custom-built Command & Control (C2) framework, currently under active development. Designed for red team operations and a…☆33Jul 31, 2025Updated 7 months ago
- Timed shut down of your Windows PC☆13Oct 19, 2025Updated 4 months ago
- Mythic C2 CheatSheet for OSEP☆60Jan 21, 2026Updated last month
- A Discord token grabber (grabs wallets, passwords, cookies, discord etc.)☆10Sep 29, 2022Updated 3 years ago
- Reads PE headers and virtual memory from file or buffer in Java☆23Jul 31, 2023Updated 2 years ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆20May 3, 2022Updated 3 years ago
- Root module for creating Tier Model / Delegation Model on Active Directory☆20Aug 28, 2025Updated 6 months ago
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆20Sep 15, 2024Updated last year