degenerat3 / CrowdControlLinks
C2 over web
☆8Updated 5 years ago
Alternatives and similar repositories for CrowdControl
Users that are interested in CrowdControl are comparing it to the libraries listed below
Sorting:
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- A C2 Bot using Raw Sockets on both Windows and Linux☆8Updated 4 years ago
- Custom SOCKS proxy for redteam☆12Updated 3 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Deploy redteam infrastructure☆16Updated 4 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- NGINX module to allow for RCE through a specific header☆27Updated 2 years ago
- ☆16Updated 4 years ago
- DLL Injector as a service that watches the health of the started thread.☆9Updated 5 years ago
- Windows NTLM Authentication Backdoor☆16Updated 3 years ago
- various slides and presentations I've worked on☆19Updated 2 months ago
- ☆9Updated 4 years ago
- ☆16Updated 4 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- ☆15Updated 4 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Updated 5 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Registry hive parsing the async way☆21Updated 2 months ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Protect your servers with a secret header☆29Updated 4 years ago
- ☆16Updated 5 years ago
- Linux rust keylogger☆16Updated last year
- Removal of certain event logs within a Windows OS☆8Updated 5 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- ☆20Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆20Updated 3 years ago