daniel-infosec / wikipedia-c2View external linksLinks
POC for utilizing wikipedia API for Command and Control
☆29Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for wikipedia-c2
Users that are interested in wikipedia-c2 are comparing it to the libraries listed below
Sorting:
- SecistSploit☆17Dec 6, 2018Updated 7 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- A research done by Yaara Shriki and Roman Zaikin on Google maps April Fool Prank.☆15Oct 21, 2019Updated 6 years ago
- 本项目仅用于记录团队内部分享议题及一些大事件,记录团队成长的过程。☆10Apr 2, 2019Updated 6 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- ANWI - All New Wireless IDS☆29Aug 3, 2018Updated 7 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Oct 26, 2022Updated 3 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Sep 16, 2024Updated last year
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 2 years ago
- The full story of the CLR implementation of Meterpreter☆153Jul 29, 2020Updated 5 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- PowerShell to Slack C2☆109May 31, 2018Updated 7 years ago
- A Python API client for interacting with the Gumroad API☆18Oct 1, 2025Updated 4 months ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆120Apr 30, 2019Updated 6 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Jun 5, 2023Updated 2 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- ☆19Aug 1, 2019Updated 6 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 6 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- ☆22Aug 15, 2019Updated 6 years ago
- ☆50Jul 9, 2025Updated 7 months ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Nov 11, 2014Updated 11 years ago
- Messing Apple devices on the network with CVE-2018-4407 (heap overflow in bad packet handling)☆25Dec 4, 2018Updated 7 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆69Apr 12, 2022Updated 3 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago