SaadAhla / GithubC2Links
Github as C2 Demonstration , free API = free C2 Infrastructure
☆143Updated 2 years ago
Alternatives and similar repositories for GithubC2
Users that are interested in GithubC2 are comparing it to the libraries listed below
Sorting:
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- ☆169Updated last year
- AV bypass while you sip your Chai!☆224Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.☆239Updated 2 years ago
- Evasive Golang Loader☆138Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- ☆220Updated last year
- Weaponized HellsGate/SigFlip☆207Updated 2 years ago
- ☆161Updated 2 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Updated last year
- ☆163Updated 2 years ago
- ☆245Updated 2 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- Execute shellcode files with rundll32☆211Updated last year
- ☆166Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆279Updated 9 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆163Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆150Updated 2 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆200Updated last year
- The Official Sliver Armory☆121Updated 7 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 4 years ago
- Shaco is a linux agent for havoc☆167Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆308Updated last year
- ☆234Updated last year
- Havoc C2 profile generator☆99Updated 4 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆324Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Updated last year