daniellowrie / C2-ListView external linksLinks
List of Command&Control (C2) software
☆48Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for C2-List
Users that are interested in C2-List are comparing it to the libraries listed below
Sorting:
- ☆12Oct 31, 2022Updated 3 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Simple XSS vulnerability checker tool very useful with xsschecker.☆28Nov 21, 2025Updated 2 months ago
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Updated this week
- ☆34May 24, 2023Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated 10 months ago
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- ☆25Aug 19, 2024Updated last year
- ☆16Apr 12, 2018Updated 7 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- Files and Tools associated with Practical Social Engineering (2020) (c) NoStarch Press and Joe Gray☆27May 2, 2022Updated 3 years ago
- A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port.☆22Jul 26, 2020Updated 5 years ago
- A BurpSuite extension for vulnerability Scanning☆28Feb 16, 2024Updated last year
- ☆31May 31, 2022Updated 3 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- python wrapper to use tshark for file extraction from the command line.☆26Nov 15, 2018Updated 7 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- ☆30Nov 7, 2022Updated 3 years ago
- CryptoKnightX é uma ferramenta para criptografar arquivos utilizando GnuPG.☆10Sep 28, 2025Updated 4 months ago
- List all public repositories for (valid) GitHub usernames☆76Sep 25, 2023Updated 2 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- Azure Terrafy Import Walkthrough☆32Jun 16, 2022Updated 3 years ago
- This is a Cheatsheet for eJPT.☆16Jan 26, 2021Updated 5 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Jun 23, 2024Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Nov 16, 2023Updated 2 years ago
- This repository contains the source code of the OWASP TOP 10 NodeJS Panel I have used☆10Nov 20, 2022Updated 3 years ago
- ☆13Jun 10, 2022Updated 3 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- 0x94TR Burp Extension - Java version☆31Sep 26, 2020Updated 5 years ago
- ☆80Nov 27, 2023Updated 2 years ago
- Some Dorking resources☆38Aug 8, 2024Updated last year
- Burp Suite Proxy Toggler Lite Add-on for Mozilla Firefox.☆34Nov 29, 2025Updated 2 months ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- GNS3 Topology Converter☆15Jan 28, 2016Updated 10 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago