Trevohack / Dynasty-C2
A C2 framework inspired by anime, made in python.
☆11Updated 6 months ago
Alternatives and similar repositories for Dynasty-C2:
Users that are interested in Dynasty-C2 are comparing it to the libraries listed below
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆12Updated 4 months ago
- Manage variables effectively when playing CTFs☆11Updated 9 months ago
- PassBreaker☆56Updated 10 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆45Updated 8 months ago
- Bad scripts I made doing CTF's☆21Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆42Updated last month
- This is for Ethical Use only!☆29Updated 2 weeks ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆28Updated 11 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 5 months ago
- CVE-2024-28955 Exploitation PoC☆34Updated 7 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆15Updated 7 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last year
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆18Updated last year
- ProxyChecker Made in NodeJS☆37Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆17Updated 9 months ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆30Updated last year
- TryHackMe Roadmap☆28Updated 9 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆105Updated 2 months ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆62Updated 11 months ago
- List of payloads: reverse shell, bind shell, webshell.☆31Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- Red Teaming tools and techniques☆50Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆18Updated 6 months ago
- Auto exploitation tool for CVE-2024-24401.☆32Updated 5 months ago
- ☆10Updated last year
- A C2 framework built for my bachelors thesis☆56Updated 3 months ago
- an exploit of Server-side request forgery (SSRF)☆49Updated 6 months ago