enigma522 / C2-frameworkLinks
This is Command and Control (C2) Framework (cli / c2-server / implant)
☆17Updated 9 months ago
Alternatives and similar repositories for C2-framework
Users that are interested in C2-framework are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Updated last year
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆21Updated 7 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆24Updated 9 months ago
- command control framework☆21Updated last month
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- Dump Linux keyrings☆19Updated 10 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆32Updated last year
- Some anti-sandbox techniques implemented in Golang.☆11Updated last year
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Updated 11 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆31Updated 2 weeks ago
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆25Updated 7 months ago
- ☆11Updated 10 months ago
- Beacon Debugger☆40Updated 7 months ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆18Updated 11 months ago
- AV/EDR killer using BYOVD technique☆33Updated 8 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated 10 months ago
- This is a library for stealing browser passwords, crypto stuff, password manager extension stuff, and just general applications too☆10Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆29Updated this week
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated last month
- BYOVD Technique Example using viragt64 driver☆40Updated 10 months ago
- AV engines evasion for C++ simple malware part 1 source code☆13Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- NailaoLoader: Hiding Execution Flow via Patching☆21Updated 3 months ago
- ☆54Updated 2 years ago
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆13Updated last month
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 3 years ago
- Windows C++ Implant for Exploration C2☆31Updated last week
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year