RATandC2 / VirusTotalC2Links
Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , and in case you don't have C2 infrastructure , now you have a free one
☆28Updated 2 years ago
Alternatives and similar repositories for VirusTotalC2
Users that are interested in VirusTotalC2 are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆55Updated 9 months ago
- ☆105Updated 10 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆71Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆75Updated 3 months ago
- ☆38Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆47Updated last year
- 「💀」Proof of concept on BYOVD attack☆161Updated 8 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆163Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- ☆161Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆99Updated 3 years ago
- An interactive shell to spoof some LOLBins command line☆185Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆195Updated 5 months ago
- PowerShell script to generate ShellCode in various formats☆42Updated 10 months ago
- Encodes a payload within a generated mock-CSS file☆58Updated last year
- LSTAR - CobaltStrike Translated to EN☆21Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- ☆85Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 2 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 10 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆59Updated last year
- ☆21Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆101Updated 3 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆88Updated 2 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Updated 4 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 4 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 6 months ago