Covert Channels for C2 Server
☆17Oct 2, 2015Updated 10 years ago
Alternatives and similar repositories for c2
Users that are interested in c2 are comparing it to the libraries listed below
Sorting:
- ☆15Apr 12, 2018Updated 7 years ago
- PowerShell_Popup☆33Feb 10, 2015Updated 11 years ago
- Nishang - PowerShell for penetration testing and offensive security.☆14May 4, 2015Updated 10 years ago
- initial push☆14Feb 10, 2015Updated 11 years ago
- Reddit XSS Gather Tool☆20Apr 24, 2015Updated 10 years ago
- A scanning tool for the ShellShock bash vulnerability☆34Sep 7, 2017Updated 8 years ago
- Raspberry Pi 2 C2☆15Feb 24, 2015Updated 11 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆30Jul 8, 2016Updated 9 years ago
- PowerShell Helper Tool☆150Mar 6, 2015Updated 10 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Helper script to automatically synchronize Bash shell history and remember it forever☆17Jul 10, 2019Updated 6 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Feb 16, 2014Updated 12 years ago
- ☆21Jun 24, 2018Updated 7 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- Challenges, notes & other stuff from the HackEire CTF.....☆35Apr 1, 2016Updated 9 years ago
- Reverse shell for remote administration☆29Feb 12, 2018Updated 8 years ago
- thp2 setup☆265Aug 25, 2019Updated 6 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Meterpreter Scripts that I'm working on☆171Jan 28, 2019Updated 7 years ago
- ☆11Feb 12, 2026Updated 2 weeks ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 5 years ago
- Process Hollowing☆12Sep 13, 2017Updated 8 years ago
- Rust + Tor (embedded) + Static (compile) + Windows + Proof of Concept☆13Feb 4, 2018Updated 8 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.☆99May 4, 2015Updated 10 years ago
- An example MS-W32T client to show how to use midl.exe in a project managed by CMake☆11Feb 25, 2023Updated 3 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- Simple tool that allows add custom function (with custom dll) to PE-file import section☆11Apr 23, 2019Updated 6 years ago
- A Portable Executable (PE) Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with c…☆20Mar 11, 2023Updated 2 years ago
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago