A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
☆44Feb 25, 2023Updated 3 years ago
Alternatives and similar repositories for meteor
Users that are interested in meteor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆301Feb 7, 2024Updated 2 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 5 years ago
- Repo to archive the 2019 RITSEC CTF Challenges & Documentation☆33Aug 26, 2020Updated 5 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 4 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 4 months ago
- ☆11Apr 10, 2021Updated 5 years ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆22Jul 4, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 6 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆23Feb 22, 2026Updated last month
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255May 1, 2023Updated 2 years ago
- A multiple reverse shell sessions/clients manager via terminal written in go☆14Jun 19, 2021Updated 4 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- Discord C2 for Redteam....Need a better name☆143May 7, 2023Updated 2 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- ☆69May 22, 2023Updated 2 years ago
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Extensible Red Team Framework☆112Dec 2, 2019Updated 6 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆97Jul 26, 2021Updated 4 years ago
- ☆29May 25, 2021Updated 4 years ago
- Run commands on linux through those pesky firewalls☆31Jul 21, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 7 years ago
- Customized Kali Linux - Ansible playbook☆67Dec 7, 2020Updated 5 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆40Feb 25, 2023Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆15Sep 4, 2019Updated 6 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Apr 25, 2022Updated 3 years ago
- backdoor c2☆40Jan 14, 2020Updated 6 years ago