geek-repo / C2-Server
Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed
☆25Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for C2-Server
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Updated 4 years ago
- Classic Web shell upload techniques & Web RCE techniques☆24Updated 2 weeks ago
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆54Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆38Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆43Updated 7 years ago
- ☆117Updated 8 months ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 2 years ago
- Undetectable payload for Windows 10 and 11☆39Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆71Updated last year
- Just a simple ransomware in python with a command and control server (C2) that is running flask☆24Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆119Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆32Updated 5 months ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆61Updated 9 months ago
- Bifrost C2. Open-source post-exploitation using Discord API☆46Updated 3 years ago
- C2 server to connect to a victim machine via reverse shell☆48Updated 2 years ago
- the assembly shell and backdoor Trojan☆17Updated 2 years ago
- Advanced Keylogger / Info Grabber written in C++.☆25Updated last year
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆95Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆42Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆104Updated 5 months ago
- Pentesting Tools to Automatize Active Directory Hacking☆14Updated 2 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆27Updated 2 years ago
- Wisper helps to maintain access to windows machine and have some other cool features like UAC Disable,Firewall Disable,Dumping Credential…☆13Updated 3 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆30Updated 2 years ago