VolchockC2 is a custom-built Command & Control (C2) framework, currently under active development. Designed for red team operations and adversary simulation, VolchockC2 focuses on flexibility, stealth, and efficient post-exploitation capabilities.
☆33Jul 31, 2025Updated 7 months ago
Alternatives and similar repositories for VolchockC2
Users that are interested in VolchockC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modern Portfolio Website Using Next.js 14☆10Mar 15, 2024Updated 2 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆15Sep 20, 2024Updated last year
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆13Aug 19, 2022Updated 3 years ago
- Root module for creating Tier Model / Delegation Model on Active Directory☆20Aug 28, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Offensive Web is a documentation website about web security research, bypass and new exploitation techniques.☆33Feb 14, 2026Updated last month
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- OSINT datatabase (France / Internationale)☆36Mar 18, 2026Updated last week
- ☆21Aug 22, 2022Updated 3 years ago
- AircrackNG commands guide☆21Jun 24, 2018Updated 7 years ago
- Python exploit for the vsftpd 2.3.4☆25Jul 24, 2024Updated last year
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆23Feb 23, 2021Updated 5 years ago
- ☆24Jul 27, 2023Updated 2 years ago
- USB NIC Driver for ESXi 5.1/5.5/6.0/6.5/6.7 based on the ASIX ax88179_178a source code☆11Feb 12, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 10 months ago
- This is a Restaurant Management Project developed using Java and JavaFX and Scene Builder, where Admin can manage meals and drinks prices…☆19May 2, 2019Updated 6 years ago
- It is a Web Application for the new way of trading agricultural products by cut-loosing the middle interfaces between farmer and the cons…☆21Dec 7, 2019Updated 6 years ago
- Scripts permettant de contourner la protection antivirale de Windows Defender via la technique de Direct Syscalls avec une injection de s…☆31Oct 14, 2022Updated 3 years ago
- Swagger UI >=3.14.1 < 3.38.0 XSS payload☆24Mar 31, 2024Updated last year
- ☆33Jul 25, 2023Updated 2 years ago
- Download several lists from https://www.iblocklist.com/lists and concatenate them into one .p2p file☆17May 14, 2017Updated 8 years ago
- Obfuscate the bytes of your payload with an association dictionary☆76Nov 7, 2025Updated 4 months ago
- Scripts related to synology backup (rsync & hubic) & data corruption detection☆17Mar 6, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Simple demonstration for how to fuzz test a C++ program with AFL.☆27Mar 10, 2020Updated 6 years ago
- example integrate keycloak sso with php and javascript☆39Feb 19, 2020Updated 6 years ago
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Nov 3, 2022Updated 3 years ago
- ☆39Oct 18, 2024Updated last year
- osint tool for dumping links containing trackers from each user on one or all discords☆74May 12, 2025Updated 10 months ago
- iMeals is a Open Source Restaurant Software for Food Delivery and Restaurant Management☆40Sep 26, 2019Updated 6 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Jan 23, 2024Updated 2 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Scripts to generate WebPagetest tests and download results☆121Oct 13, 2016Updated 9 years ago
- Create a custom theme for Keycloak Login screen☆38Jul 26, 2022Updated 3 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago