Pwn3rzs / HAK5-C2-License-ToolkitLinks
Golang tool to help in forcing a license for HAK5 C2 Tool
β52Updated 2 years ago
Alternatives and similar repositories for HAK5-C2-License-Toolkit
Users that are interested in HAK5-C2-License-Toolkit are comparing it to the libraries listed below
Sorting:
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·β84Updated 10 months ago
- A keygen for Specter Insight C2β41Updated 10 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagementβ65Updated 3 years ago
- A Cobalt Strike Beacon Notifier Via Telegram Bot.β18Updated 2 years ago
- CHAOS RAT web panel path RCE PoCβ30Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β112Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerabilityβ41Updated 3 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious processβ73Updated last year
- Windows Privilege Escalationβ70Updated 3 years ago
- β29Updated 2 years ago
- RTF Crash POC Python 3.11 Windows 10β46Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ54Updated last year
- RCE PoC for Empire C2 framework <5.9.3β27Updated last year
- CVE-2023-20198 & 0Day Implant Scannerβ32Updated last month
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.β19Updated 3 years ago
- β42Updated last year
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.β42Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated 2 years ago
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Serverβ38Updated last year
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated 2 years ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.β126Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Pythonβ25Updated 2 years ago
- Memory Scanerβ65Updated 3 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromisβ¦β126Updated last year
- A testing Red Team Infrastructure created with Dockerβ32Updated 3 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.β38Updated 2 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text verβ¦β39Updated 3 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23β116Updated 2 years ago
- An aggressor script that can help automate payload building in Cobalt Strikeβ116Updated last year
- C++ Code to perform a MiniDump of lsass.exeβ36Updated 2 years ago