RATandC2 / VirusTotalC2Links
Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , and in case you don't have C2 infrastructure , now you have a free one
☆34Updated 3 years ago
Alternatives and similar repositories for VirusTotalC2
Users that are interested in VirusTotalC2 are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆57Updated 3 weeks ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Updated 2 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- ☆44Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆91Updated 9 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆60Updated 4 months ago
- A collection of Cobalt Strike Aggressor scripts.☆110Updated 4 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75Updated last year
- ☆120Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Updated 2 years ago
- ☆86Updated 3 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆175Updated last year
- C2 writen in Rust & Go powered by Tor network.☆153Updated 3 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 9 months ago
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 11 months ago
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- execute PE in memory Filelessly☆50Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated 2 years ago
- ☆59Updated last year