Covert Channels for C2 Server
☆17Oct 2, 2015Updated 10 years ago
Alternatives and similar repositories for c2
Users that are interested in c2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Apr 12, 2018Updated 8 years ago
- PowerShell_Popup☆33Feb 10, 2015Updated 11 years ago
- Nishang - PowerShell for penetration testing and offensive security.☆14May 4, 2015Updated 10 years ago
- Reddit XSS Gather Tool☆20Apr 24, 2015Updated 11 years ago
- Raspberry Pi 2 C2☆15Feb 24, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- initial push☆14Feb 10, 2015Updated 11 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆30Jul 8, 2016Updated 9 years ago
- ☆21Jun 24, 2018Updated 7 years ago
- PowerShell Helper Tool☆150Mar 6, 2015Updated 11 years ago
- Helper script to automatically synchronize Bash shell history and remember it forever☆17Jul 10, 2019Updated 6 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Feb 16, 2014Updated 12 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The web in your terminal☆26Sep 24, 2014Updated 11 years ago
- Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.☆99May 4, 2015Updated 10 years ago
- Challenges, notes & other stuff from the HackEire CTF.....☆36Apr 1, 2016Updated 10 years ago
- thp2 setup☆267Aug 25, 2019Updated 6 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- A Windows Installer for SickRage☆24Dec 13, 2015Updated 10 years ago
- Your last stop for password list generation needs!☆27Mar 4, 2015Updated 11 years ago
- Configuration for openvpn to route traffic selectively over the VPN☆49Oct 2, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Meterpreter Scripts that I'm working on☆171Jan 28, 2019Updated 7 years ago
- The pentest companion☆15Sep 1, 2021Updated 4 years ago
- An example MS-W32T client to show how to use midl.exe in a project managed by CMake☆11Feb 25, 2023Updated 3 years ago
- Mass scanning and fuzzing library☆48Apr 18, 2026Updated last week
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 15 years ago
- 针对PHP网马的正则查杀☆13Jan 10, 2018Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Oct 16, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆18Jan 29, 2012Updated 14 years ago
- Library for creating CTF services.☆75Nov 11, 2016Updated 9 years ago
- Binary resource copier☆96Apr 14, 2025Updated last year
- A desktop App to add STIX-2 objects to TAXII-2.0 servers☆11Mar 13, 2019Updated 7 years ago
- WEB 跨域postMessage() 漏洞挖掘工具,基本原理:使用AJAX 获取页面代码,结合iframe 和data 协议构造测试环境,然后在iframe 下的window.onmessage 中插入hook 监控onmessage 的参数,最后通过能否被原来的onme…☆11Sep 13, 2016Updated 9 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment)☆10Jun 13, 2017Updated 8 years ago
- FROM BEGINNER TO ADVANCED FOR ALL SECURITY ENTHUSIASTS.☆18Mar 23, 2018Updated 8 years ago