bmdyy / discord-c2Links
Using Discord as a C2 - Proof of Concept
☆60Updated 2 years ago
Alternatives and similar repositories for discord-c2
Users that are interested in discord-c2 are comparing it to the libraries listed below
Sorting:
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆120Updated 6 months ago
- ☆43Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆68Updated 2 months ago
- A collection of config files for linux focusing on hackthebox theme☆46Updated 6 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 11 months ago
- A collection of tools that I use in CTF's or for assessments☆100Updated 4 months ago
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file h…☆86Updated 2 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆188Updated 4 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆102Updated last year
- ☆40Updated 6 months ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆135Updated last year
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆56Updated 4 months ago
- Crappy Golang code to list local listening ports and their associated processes.☆31Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆77Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated last month
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- The Havoc Framework☆58Updated 2 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆19Updated 10 months ago
- ☆95Updated last month
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 8 months ago
- Completely Risky Active-Directory Simulation Hub☆101Updated last year
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆52Updated 6 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆124Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆195Updated 3 months ago
- ☆64Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 9 months ago
- MOVEit CVE-2023-34362☆139Updated 2 years ago