List of Command&Control (C2) software
☆50Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for C2-List
Users that are interested in C2-List are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 10 months ago
- ☆12Oct 31, 2022Updated 3 years ago
- A list of hacking/security resources that are focused on IoT☆62Dec 6, 2022Updated 3 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 4 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- A simple, dockerized python based Command and Control(C2) Framework named SpyderC2☆38Jul 9, 2023Updated 2 years ago
- ☆16Apr 12, 2018Updated 7 years ago
- ☆15Jan 27, 2022Updated 4 years ago
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated last month
- ☆34May 24, 2023Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Sep 3, 2022Updated 3 years ago
- ☆31May 31, 2022Updated 3 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- CryptoKnightX é uma ferramenta para criptografar arquivos utilizando GnuPG.☆10Sep 28, 2025Updated 6 months ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- TensorFlow materials☆13Jan 8, 2021Updated 5 years ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated 11 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- This is a Cheatsheet for eJPT.☆16Jan 26, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 2 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Dec 2, 2025Updated 3 months ago
- python wrapper to use tshark for file extraction from the command line.☆26Nov 15, 2018Updated 7 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆12Apr 3, 2023Updated 2 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Nov 17, 2019Updated 6 years ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆26Dec 8, 2025Updated 3 months ago
- An open-source self-hosted purple team management web application.☆27Dec 10, 2025Updated 3 months ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆83Jun 11, 2025Updated 9 months ago
- A script that checks a bunch of obvious cyber-security stuff in order to try and compromise a host through it's open services.☆13Apr 17, 2022Updated 3 years ago
- Solutions of xchg rax,rax☆15Jun 2, 2020Updated 5 years ago
- GNS3 Topology Converter☆15Jan 28, 2016Updated 10 years ago