govindasamyarun / c2-cloud
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
β105Updated last year
Alternatives and similar repositories for c2-cloud:
Users that are interested in c2-cloud are comparing it to the libraries listed below
- An aggressor script that can help automate payload building in Cobalt Strikeβ114Updated last year
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β158Updated last year
- Reverse shell that can bypass windows defender detectionβ161Updated last year
- Heavily obfuscated ASP web shell generation tool.β160Updated 10 months ago
- PowerShell Obfuscatorβ114Updated 9 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575β85Updated 3 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike β a Go-based tool for ethical hacking and Red Team operationβ¦β174Updated 6 months ago
- β214Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β150Updated 10 months ago
- β163Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ134Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated last year
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profilesβ195Updated 8 months ago
- Continuous password spraying toolβ129Updated last week
- β63Updated 11 months ago
- Encoder PHP webshell to bypass WAF using XOR operations.β53Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ93Updated last year
- β150Updated 8 months ago
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- Everything and anything related to password sprayingβ133Updated 9 months ago
- Different methods to get current username without using whoamiβ174Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.β49Updated 9 months ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCEβ189Updated 4 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β60Updated 6 months ago
- TeamServer and Client of Exploration Command and Control Frameworkβ108Updated 3 weeks ago
- β113Updated last year
- β42Updated 5 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ53Updated last year
- Repo for all my exploits/PoCsβ48Updated 3 weeks ago
- A Tool that aims to evade av with binary paddingβ147Updated 8 months ago