List of Command&Control (C2) software
☆50Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for C2-List
Users that are interested in C2-List are comparing it to the libraries listed below
Sorting:
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated 3 weeks ago
- ☆34May 24, 2023Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated 11 months ago
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- ☆25Aug 19, 2024Updated last year
- ☆16Apr 12, 2018Updated 7 years ago
- ☆15Jan 27, 2022Updated 4 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Nov 17, 2019Updated 6 years ago
- random code snippets, useful for getting started☆122Nov 29, 2025Updated 3 months ago
- A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port.☆22Jul 26, 2020Updated 5 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 2 months ago
- python wrapper to use tshark for file extraction from the command line.☆26Nov 15, 2018Updated 7 years ago
- A BurpSuite extension for vulnerability Scanning☆29Feb 16, 2024Updated 2 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- List all public repositories for (valid) GitHub usernames☆76Sep 25, 2023Updated 2 years ago
- Azure Terrafy Import Walkthrough☆32Jun 16, 2022Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- This is a Cheatsheet for eJPT.☆16Jan 26, 2021Updated 5 years ago
- Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulati…☆82Dec 29, 2025Updated 2 months ago
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- This repository contains the source code of the OWASP TOP 10 NodeJS Panel I have used☆10Nov 20, 2022Updated 3 years ago
- ☆13Jun 10, 2022Updated 3 years ago
- A simple tool which makes creating nuclei templates even easier.☆37Jun 23, 2024Updated last year
- 0x94TR Burp Extension - Java version☆31Sep 26, 2020Updated 5 years ago
- A simple, dockerized python based Command and Control(C2) Framework named SpyderC2☆38Jul 9, 2023Updated 2 years ago
- Basic implementation of certstream to print new subdomains and domains☆36Jul 6, 2021Updated 4 years ago
- Distributed Multi-INT Fusion Center designed for decentralized situational awareness.☆47Updated this week
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- GNS3 Topology Converter☆15Jan 28, 2016Updated 10 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago