Trevohack / Dynasty-C2
A C2 framework inspired by anime, made in python.
☆11Updated 8 months ago
Alternatives and similar repositories for Dynasty-C2:
Users that are interested in Dynasty-C2 are comparing it to the libraries listed below
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆12Updated 6 months ago
- Manage variables effectively when playing CTFs☆10Updated 11 months ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆29Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 4 months ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last year
- POC Pdf-exploit builder on C#☆13Updated last year
- A toolkit to control TTY devicesUpdated 2 years ago
- Exploits for some linux binaries :)☆36Updated 3 months ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 2 years ago
- ☆38Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆17Updated 11 months ago
- an exploit of Server-side request forgery (SSRF)☆50Updated 8 months ago
- ☆17Updated last year
- ☆18Updated 7 months ago
- ☆49Updated 10 months ago
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 11 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆62Updated 6 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆43Updated 6 months ago
- Making your own CTF☆26Updated 4 years ago
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆18Updated last year
- Check out this JavaScript code that extracts URLs from a web page and linked scripts! Perfect for web scraping and penetration testing☆18Updated 9 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 6 months ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- ☆14Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆12Updated last year
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆31Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago