Covert Channels for C2 Server
☆17Oct 2, 2015Updated 10 years ago
Alternatives and similar repositories for c2
Users that are interested in c2 are comparing it to the libraries listed below
Sorting:
- ☆15Apr 12, 2018Updated 7 years ago
- PowerShell_Popup☆33Feb 10, 2015Updated 11 years ago
- Nishang - PowerShell for penetration testing and offensive security.☆14May 4, 2015Updated 10 years ago
- Reddit XSS Gather Tool☆20Apr 24, 2015Updated 10 years ago
- Raspberry Pi 2 C2☆15Feb 24, 2015Updated 11 years ago
- A scanning tool for the ShellShock bash vulnerability☆34Sep 7, 2017Updated 8 years ago
- initial push☆14Feb 10, 2015Updated 11 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆30Jul 8, 2016Updated 9 years ago
- ☆21Jun 24, 2018Updated 7 years ago
- PowerShell Helper Tool☆150Mar 6, 2015Updated 11 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Feb 16, 2014Updated 12 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- The web in your terminal☆25Sep 24, 2014Updated 11 years ago
- Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.☆99May 4, 2015Updated 10 years ago
- Challenges, notes & other stuff from the HackEire CTF.....☆35Apr 1, 2016Updated 9 years ago
- thp2 setup☆265Aug 25, 2019Updated 6 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- A Windows Installer for SickRage☆24Dec 13, 2015Updated 10 years ago
- Configuration for openvpn to route traffic selectively over the VPN☆49Oct 2, 2015Updated 10 years ago
- Meterpreter Scripts that I'm working on☆171Jan 28, 2019Updated 7 years ago
- ☆11Feb 12, 2026Updated last month
- The pentest companion☆15Sep 1, 2021Updated 4 years ago
- SEQ/Ack signature triggered SSL back connect☆10May 20, 2016Updated 9 years ago
- Mass scanning and fuzzing library☆48Updated this week
- An example MS-W32T client to show how to use midl.exe in a project managed by CMake☆11Feb 25, 2023Updated 3 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- 针对PHP网马的正则查杀☆13Jan 10, 2018Updated 8 years ago
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Oct 16, 2015Updated 10 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Library for creating CTF services.☆75Nov 11, 2016Updated 9 years ago
- Binary resource copier☆99Apr 14, 2025Updated 11 months ago