bmdyy / discord-c2Links
Using Discord as a C2 - Proof of Concept
☆59Updated 2 years ago
Alternatives and similar repositories for discord-c2
Users that are interested in discord-c2 are comparing it to the libraries listed below
Sorting:
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 5 months ago
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 10 months ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆77Updated last year
- ☆43Updated last year
- Red Teaming tools and techniques☆52Updated 2 years ago
- The Havoc Framework☆57Updated 2 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆151Updated 2 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆77Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆129Updated 7 months ago
- macos stealer poc☆114Updated last month
- ☆103Updated 8 months ago
- A tool to dump exposed .git repositories☆67Updated 7 months ago
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆52Updated 5 months ago
- X-Platform bind shell in TypeScript!☆28Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆68Updated 2 months ago
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file h…☆86Updated last month
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 10 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆87Updated last year
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆209Updated 8 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆132Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆186Updated 3 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆128Updated last year
- PowerShell Obfuscator☆178Updated last year
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆267Updated 2 years ago
- MOVEit CVE-2023-34362☆140Updated last year
- A collection of offensive Go packages inspired by different Go repositories.☆242Updated 7 months ago