Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed
☆25Jul 23, 2019Updated 6 years ago
Alternatives and similar repositories for C2-Server
Users that are interested in C2-Server are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Dec 9, 2017Updated 8 years ago
- ☆54Oct 13, 2025Updated 5 months ago
- Android backdoored app, improved source code of msfvenom android .apk☆12May 31, 2019Updated 6 years ago
- this is the youtube phishing html, use it to grab anyones google account info ! Link : https://pinkythegawd.github.io/youtube-phishing-pa…☆18Oct 10, 2025Updated 6 months ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆48Apr 7, 2025Updated last year
- ☆10Oct 11, 2020Updated 5 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- ☆10Oct 25, 2017Updated 8 years ago
- Extension spoofer and reverse shell generator☆11Apr 18, 2020Updated 5 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated last week
- Fully automated dev environment setup with dotfiles☆11Updated this week
- Packer and Vagrant configurations for Kali Linux☆14Jun 26, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 months ago
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Storage for the IOCs I collect☆11Apr 3, 2026Updated last week
- Decrypt Chromium based browser passwords with PowerShell.☆135Mar 31, 2026Updated last week
- Python implementation of the SlowLoris DoS attack.☆23Mar 19, 2017Updated 9 years ago
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- Easy recon tool for OSCP and HTB☆10Aug 8, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Comprehensive Protection Against Deepfakes, Deepnudes & Harmful Content☆20Jan 3, 2026Updated 3 months ago
- The Reverse Proxy keeps track of available servers, receives client data, forwards client data to servers with corresponding privacy poli…☆16May 19, 2021Updated 4 years ago
- AI-powered reverse-engineering of Rosetta (2 for Linux). Disclaimer: due to the user agreement, I will not touch the code. All is done by…☆59Mar 14, 2026Updated 3 weeks ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 6 years ago
- Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505☆18Jun 8, 2017Updated 8 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- yet another tweak injector / tweak hooking library for darwin systems☆16Apr 26, 2024Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆20Jul 16, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A Terraform module for deploying a Talos cluster on vSphere☆17Apr 7, 2021Updated 5 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated 3 weeks ago
- Access this repo on codeberg: https://codeberg.org/fieryhenry/BCGM-Python☆16Aug 17, 2025Updated 7 months ago
- Files to automatically deploy red team Active Directory test lab☆49May 6, 2022Updated 3 years ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated last month
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago