POC for utilizing wikipedia API for Command and Control
☆28Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for wikipedia-c2
Users that are interested in wikipedia-c2 are comparing it to the libraries listed below
Sorting:
- SecistSploit☆17Dec 6, 2018Updated 7 years ago
- ☆15May 23, 2019Updated 6 years ago
- A research done by Yaara Shriki and Roman Zaikin on Google maps April Fool Prank.☆15Oct 21, 2019Updated 6 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- 本项目仅用于记录团队内部分享议题及一些大事件,记录团队成长的过程。☆10Apr 2, 2019Updated 6 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Sep 16, 2024Updated last year
- Bro integration with osquery☆15Mar 24, 2023Updated 2 years ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- The full story of the CLR implementation of Meterpreter☆153Jul 29, 2020Updated 5 years ago
- PowerShell to Slack C2☆109May 31, 2018Updated 7 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Mar 22, 2017Updated 8 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆55Apr 28, 2022Updated 3 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- ☆19Aug 1, 2019Updated 6 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- ☆93Nov 1, 2018Updated 7 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- ☆22Aug 15, 2019Updated 6 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆33Sep 21, 2019Updated 6 years ago
- Messing Apple devices on the network with CVE-2018-4407 (heap overflow in bad packet handling)☆25Dec 4, 2018Updated 7 years ago
- 010 Editor template for ACE archive format & CVE-2018-2025[0-3]☆26Feb 22, 2019Updated 7 years ago
- xss payloads generator☆25Mar 1, 2019Updated 7 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆33Jul 7, 2016Updated 9 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- Basic C2 Server☆196Jul 3, 2021Updated 4 years ago