A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
☆530Feb 5, 2024Updated 2 years ago
Alternatives and similar repositories for GodGenesis
Users that are interested in GodGenesis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sandman is a NTP based backdoor for hardened networks.☆817Mar 31, 2024Updated 2 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,367May 21, 2025Updated 10 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,436Jan 19, 2025Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,432Jun 8, 2025Updated 10 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,159Mar 8, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆335May 29, 2023Updated 2 years ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆371Sep 17, 2025Updated 6 months ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 4 months ago
- evilginx3 + gophish☆1,976Jun 15, 2024Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,473Aug 18, 2023Updated 2 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆525Updated this week
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆243Jul 3, 2024Updated last year
- PowerShell Ransomware Simulator with C2 Server☆497Jan 2, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An XSS exploitation command-line interface and payload generator.☆1,420Jan 19, 2025Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,882Aug 18, 2023Updated 2 years ago
- The Havoc Framework☆8,266Dec 18, 2025Updated 3 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆683Oct 23, 2025Updated 5 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆481Sep 17, 2025Updated 6 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,232Aug 18, 2023Updated 2 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,098Nov 20, 2025Updated 4 months ago
- Automating situational awareness for cloud penetration tests.☆2,335Mar 24, 2026Updated 2 weeks ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆455Mar 30, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Template-Driven AV/EDR Evasion Framework☆1,787Nov 3, 2023Updated 2 years ago
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- ☆84Aug 18, 2022Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆782Jun 23, 2023Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆106Feb 15, 2024Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,107Nov 9, 2024Updated last year
- A C# Command & Control framework☆1,030Mar 28, 2024Updated 2 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,078Feb 1, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Script for generating revshells☆478Sep 10, 2024Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆472Aug 21, 2024Updated last year
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- A Command and Control (C2)☆302May 4, 2023Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,220Jan 5, 2026Updated 3 months ago
- Native Syscalls Shellcode Injector☆268Jul 2, 2023Updated 2 years ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques and used by Patchwork group.☆835Jul 2, 2024Updated last year