A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
☆44Feb 25, 2023Updated 3 years ago
Alternatives and similar repositories for meteor
Users that are interested in meteor are comparing it to the libraries listed below
Sorting:
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆301Feb 7, 2024Updated 2 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 2 months ago
- Discord as a C2☆49Jan 4, 2021Updated 5 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Discord C2 for Redteam....Need a better name☆143May 7, 2023Updated 2 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Repo to archive the 2019 RITSEC CTF Challenges & Documentation☆33Aug 26, 2020Updated 5 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆23Feb 22, 2026Updated last week
- ☆68May 22, 2023Updated 2 years ago
- Given a kind of unknown encoding and the result of encoding, using this framework, we can crack and get the original text☆20Jan 24, 2018Updated 8 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- ☆11Apr 10, 2021Updated 4 years ago
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- A C++, header-only DID:x509 resolver☆17Jun 11, 2025Updated 8 months ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Run commands on linux through those pesky firewalls☆30Jul 21, 2015Updated 10 years ago
- A multiple reverse shell sessions/clients manager via terminal written in go☆14Jun 19, 2021Updated 4 years ago
- ☆28May 25, 2021Updated 4 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- Practical examples and simulations developed at GNURadio☆17Feb 15, 2021Updated 5 years ago
- Porting Windows Dynamic Link Libraries to Linux☆20Jun 11, 2025Updated 8 months ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS☆37Feb 25, 2023Updated 3 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago