govindasamyarun / c2-cloudLinks
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
β122Updated last year
Alternatives and similar repositories for c2-cloud
Users that are interested in c2-cloud are comparing it to the libraries listed below
Sorting:
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated last year
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β158Updated 2 years ago
- Reverse shell that can bypass windows defender detectionβ167Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β107Updated 3 months ago
- β42Updated 11 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike β a Go-based tool for ethical hacking and Red Team operationβ¦β188Updated last year
- A Linux persistence tool!β157Updated last year
- PowerShell Obfuscatorβ200Updated 3 weeks ago
- β57Updated 4 months ago
- Offensive MSSQL toolkit written in Python, based off SQLReconβ204Updated 8 months ago
- A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate fβ¦β81Updated last year
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultanβ¦β233Updated 2 years ago
- Active Directory Penetration Testing for Red Teamsβ60Updated 11 months ago
- Different methods to get current username without using whoamiβ178Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β110Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated last year
- β166Updated last year
- Encoder PHP webshell to bypass WAF using XOR operations.β53Updated 2 years ago
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β153Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ54Updated last year
- β220Updated last year
- GeoServer Remote Code Executionβ82Updated 5 months ago
- cve-2024-42327 ZBX-25623β36Updated 9 months ago
- βοΈ HTML Smuggling generator&obfuscator for your Red Team operationsβ161Updated last year
- β113Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIsβ¦β158Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ136Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·β81Updated 6 months ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.β276Updated 6 months ago