☆37Apr 1, 2024Updated last year
Alternatives and similar repositories for c2-talk
Users that are interested in c2-talk are comparing it to the libraries listed below
Sorting:
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- Jasmin ransomware web panel path traversal PoC☆21Apr 9, 2024Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 11 months ago
- ☆15Aug 17, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- ☆16May 29, 2024Updated last year
- ☆18Jan 21, 2026Updated last month
- CVE-2023-21823 PoC☆14Apr 20, 2023Updated 2 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated last year
- A demo exploit for CVE-2021-44026, a SQL injection in Roundcube☆13Dec 22, 2023Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Aug 19, 2024Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155May 7, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- ☆17Dec 14, 2022Updated 3 years ago
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆19Aug 26, 2025Updated 6 months ago
- ☆80Apr 23, 2024Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆254Jun 6, 2024Updated last year
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆181May 27, 2025Updated 9 months ago
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- some leaked src code for known and unknown malwares☆23Aug 15, 2025Updated 6 months ago
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- A simple UEFI bootkit made by @NSG650 and me.☆26Dec 29, 2024Updated last year
- Open Source eBPF Malware Analysis Framework☆54Oct 20, 2024Updated last year
- ☆144May 22, 2024Updated last year
- A simple website to act as a store for havoc modules and extensions☆28Jan 20, 2025Updated last year
- ☆21Jan 28, 2020Updated 6 years ago
- Proof Of Concepts☆55Jan 4, 2026Updated 2 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 6 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Nov 20, 2021Updated 4 years ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago