Trevohack / Dynasty-C2Links
A C2 framework inspired by anime, made in python.
☆12Updated last year
Alternatives and similar repositories for Dynasty-C2
Users that are interested in Dynasty-C2 are comparing it to the libraries listed below
Sorting:
- Manage variables effectively when playing CTFs☆11Updated 5 months ago
- Red Teaming tools and techniques☆56Updated 2 years ago
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Updated 3 months ago
- Dark-Shell is a Tool for Generating ReverShell File☆116Updated 2 months ago
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 9 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆144Updated 3 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 7 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆67Updated last year
- A multi web security purposes tool☆46Updated 7 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆142Updated last month
- Vulnerabilities you my miss during a penetration testing.☆97Updated last year
- ☆45Updated 2 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 6 months ago
- POC Pdf-exploit builder on C#☆13Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆43Updated 2 years ago
- ☆25Updated last year
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆111Updated last year
- an exploit of Server-side request forgery (SSRF)☆50Updated last year