Trevohack / Dynasty-C2
A C2 framework inspired by anime, made in python.
☆11Updated 5 months ago
Alternatives and similar repositories for Dynasty-C2:
Users that are interested in Dynasty-C2 are comparing it to the libraries listed below
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆11Updated 3 months ago
- Manage variables effectively when playing CTFs☆10Updated 8 months ago
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆18Updated last year
- Basic script to generate reverse shell payloads, generally most used in ctf.☆28Updated 9 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆57Updated 3 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 11 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 8 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆37Updated 3 weeks ago
- ☆26Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆11Updated 8 months ago
- Making your own CTF☆25Updated 4 years ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆37Updated 3 weeks ago
- Red Teaming tools and techniques☆48Updated last year
- A toolkit to control TTY devices☆0Updated 2 years ago
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆32Updated last year
- Check out this JavaScript code that extracts URLs from a web page and linked scripts! Perfect for web scraping and penetration testing☆17Updated 6 months ago
- RCE Exploit For Maltrail-v0.53☆43Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated 3 months ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆29Updated 6 months ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆28Updated 10 months ago
- an exploit of Server-side request forgery (SSRF)☆48Updated 5 months ago
- ☆16Updated 3 months ago
- FireHawk: The Elite Firebase Security Testing Utility☆18Updated 8 months ago
- TryHackMe Koth - Shell vs Shell techniques☆29Updated 2 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆30Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆30Updated 7 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆40Updated 2 months ago
- reverse engineered and improved BSQLi script from Coffinxp☆12Updated 4 months ago