ariary / volana
π Shell command obfuscation to avoid detection systems
β124Updated 2 years ago
Alternatives and similar repositories for volana:
Users that are interested in volana are comparing it to the libraries listed below
- The Official Sliver Armoryβ87Updated this week
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)β146Updated 3 years ago
- A robust Red Team proxy written in Go.β161Updated 3 years ago
- Multiplayer pivoting solutionβ129Updated last week
- β113Updated last year
- POC for CVE-2022-47966 affecting multiple ManageEngine productsβ126Updated 2 years ago
- β111Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectorsβ85Updated 11 months ago
- VMware Aria Operations for Logs CVE-2023-34051β62Updated last year
- β224Updated last month
- MOVEit CVE-2023-34362β137Updated last year
- Speedy probe-based UDP service scannerβ61Updated last week
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or chβ¦β83Updated last week
- Source Code Management Attack Toolkitβ212Updated 2 years ago
- A Python gRPC Client Library for Sliverβ66Updated last month
- A webshell application and interactive shell for pentesting Apache Tomcat servers.β99Updated last month
- β105Updated 2 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in tβ¦β125Updated 2 months ago
- β154Updated 2 years ago
- ππͺ² Malleable C2 profiles parser and assembler written in golangβ61Updated 8 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).β268Updated 2 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructureβ130Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromisβ¦β100Updated 11 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation fβ¦β158Updated 7 months ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.β125Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)β240Updated 11 months ago
- A fingerprint generation helper for nuclei network templatesβ72Updated 2 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profilesβ194Updated 6 months ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.β81Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIsβ¦β133Updated 10 months ago