bmdyy / discord-c2
☆57Updated 2 years ago
Alternatives and similar repositories for discord-c2:
Users that are interested in discord-c2 are comparing it to the libraries listed below
- Hide an IP address in scripts using hex/decimal/octal conversions☆66Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 8 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- ☆42Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆114Updated this week
- A collection of red blue team staff☆46Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 3 months ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆76Updated last year
- RCE Exploit For Maltrail-v0.53☆47Updated last year
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated 10 months ago
- A collection of tools that I use in CTF's or for assessments☆95Updated last month
- ☆103Updated 6 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆60Updated last year
- ☆38Updated 3 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆102Updated last week
- ☆61Updated 11 months ago
- List of Command&Control (C2) software☆35Updated 2 years ago
- Windows priviledge escalation script☆13Updated last month
- A certificate transparency log keyword sniffer written in python☆82Updated last year
- X-Platform bind shell in TypeScript!☆28Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.☆32Updated last year
- PowerShell Obfuscator☆121Updated 9 months ago
- Crappy Golang code to list local listening ports and their associated processes.☆30Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆72Updated last month
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆128Updated 4 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year