RATandC2 / VirusTotalC2Links
Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , and in case you don't have C2 infrastructure , now you have a free one
☆30Updated 3 years ago
Alternatives and similar repositories for VirusTotalC2
Users that are interested in VirusTotalC2 are comparing it to the libraries listed below
Sorting:
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆84Updated 5 months ago
- A C2 framework built for my bachelors thesis☆57Updated 11 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆201Updated 7 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆99Updated 4 months ago
- ☆41Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆85Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- ☆85Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated last year
- 「💀」Proof of concept on BYOVD attack☆163Updated 10 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- C2 writen in Rust & Go powered by Tor network.☆143Updated 2 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆166Updated last year
- ☆105Updated last year
- macos stealer poc☆125Updated 3 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 7 months ago
- PowerShell script to generate ShellCode in various formats☆43Updated last year
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- Command and Control (C2) framework☆132Updated 5 months ago
- Situational Awareness script to identify how and where to run implants☆67Updated 10 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆61Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- ☆162Updated 2 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- execute PE in memory Filelessly☆47Updated 8 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago