degenerat3 / meteorView external linksLinks
A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
☆44Feb 25, 2023Updated 2 years ago
Alternatives and similar repositories for meteor
Users that are interested in meteor are comparing it to the libraries listed below
Sorting:
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 4 years ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆301Feb 7, 2024Updated 2 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 6 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 2 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 2 months ago
- Discord as a C2☆49Jan 4, 2021Updated 5 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆23Oct 3, 2020Updated 5 years ago
- ☆67May 22, 2023Updated 2 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 5 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Given a kind of unknown encoding and the result of encoding, using this framework, we can crack and get the original text☆20Jan 24, 2018Updated 8 years ago
- ☆11Apr 10, 2021Updated 4 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 7 years ago
- Work in Progress repo☆15Apr 18, 2019Updated 6 years ago
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- ☆28May 25, 2021Updated 4 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆15Sep 4, 2019Updated 6 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Practical examples and simulations developed at GNURadio☆17Feb 15, 2021Updated 4 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS☆37Feb 25, 2023Updated 2 years ago
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆805Dec 19, 2023Updated 2 years ago
- Customized Kali Linux - Ansible playbook☆67Dec 7, 2020Updated 5 years ago
- backdoor c2☆40Jan 14, 2020Updated 6 years ago