List of Command&Control (C2) software
☆51Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for C2-List
Users that are interested in C2-List are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 10 months ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- A list of hacking/security resources that are focused on IoT☆62Dec 6, 2022Updated 3 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The samples referenced in my book, Evasive Malware (No starch Press)☆60Feb 20, 2026Updated last month
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 4 months ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- ☆15Jan 27, 2022Updated 4 years ago
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated 2 months ago
- 💻 Windows 10 Kernel-mode rootkit☆31Sep 3, 2022Updated 3 years ago
- Files and Tools associated with Practical Social Engineering (2020) (c) NoStarch Press and Joe Gray☆29May 2, 2022Updated 3 years ago
- ☆31May 31, 2022Updated 3 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 6 years ago
- Pentester's toolbox☆12Apr 10, 2026Updated last week
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- ☆25Aug 19, 2024Updated last year
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- A mirror of "103_top_shell.rar" since the original disappeared.☆25Sep 27, 2015Updated 10 years ago
- This is a Cheatsheet for eJPT.☆16Jan 26, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CryptoKnightX é uma ferramenta para criptografar arquivos utilizando GnuPG.☆10Sep 28, 2025Updated 6 months ago
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 3 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- ☆15Dec 6, 2023Updated 2 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- ☆13Jun 10, 2022Updated 3 years ago
- Low Noise Semgrep Security Rules☆23Feb 6, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Dynamic Environment☆11Nov 14, 2025Updated 5 months ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Nov 17, 2019Updated 6 years ago
- Some Dorking resources☆38Aug 8, 2024Updated last year
- A script that checks a bunch of obvious cyber-security stuff in order to try and compromise a host through it's open services.☆13Apr 17, 2022Updated 4 years ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆83Jun 11, 2025Updated 10 months ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆26Dec 8, 2025Updated 4 months ago