bmdyy / discord-c2Links
Using Discord as a C2 - Proof of Concept
☆61Updated 2 years ago
Alternatives and similar repositories for discord-c2
Users that are interested in discord-c2 are comparing it to the libraries listed below
Sorting:
- A collection of tools that I use in CTF's or for assessments☆101Updated 7 months ago
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 5 months ago
- Wordlist to crack .zip-file password☆204Updated 3 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆142Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆191Updated 7 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆94Updated last month
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- ☆44Updated last year
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆78Updated last year
- Automate Scoping, OSINT and Recon assessments.☆96Updated 7 months ago
- ☆97Updated last week
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated last month
- Red Teaming tools and techniques☆54Updated 2 years ago
- Automate converting webshells into reverse shells.☆70Updated last month
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆63Updated 8 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- ☆105Updated last year
- Red Team Guides☆139Updated last year
- ☆38Updated 4 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆123Updated 8 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆191Updated 10 months ago
- ☆41Updated 8 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 7 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year