RATandC2 / VirusTotalC2Links
Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , and in case you don't have C2 infrastructure , now you have a free one
☆31Updated 3 years ago
Alternatives and similar repositories for VirusTotalC2
Users that are interested in VirusTotalC2 are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆56Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆108Updated last year
- ☆41Updated last year
- PowerShell script to generate ShellCode in various formats☆43Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆104Updated 3 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆167Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆85Updated 6 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆114Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆95Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆143Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆80Updated last year
- Command and Control (C2) framework☆132Updated 5 months ago
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- ☆106Updated last year
- 「💀」Proof of concept on BYOVD attack☆164Updated 11 months ago
- LSTAR - CobaltStrike Translated to EN☆22Updated 2 years ago
- C2 writen in Rust & Go powered by Tor network.☆146Updated last week
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆86Updated 2 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆72Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- macos stealer poc☆127Updated 3 months ago