govindasamyarun / c2-cloudLinks
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
☆123Updated last year
Alternatives and similar repositories for c2-cloud
Users that are interested in c2-cloud are comparing it to the libraries listed below
Sorting:
- Reverse shell that can bypass windows defender detection☆169Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆118Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- ☆42Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆111Updated 2 years ago
- Active Directory Penetration Testing for Red Teams☆58Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- A Linux persistence tool!☆158Updated 2 months ago
- ☆59Updated 6 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆142Updated 2 years ago
- ☆113Updated 2 years ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆118Updated 5 months ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆200Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆84Updated 8 months ago
- A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate f…☆84Updated 2 weeks ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆190Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated 2 years ago
- PowerShell Obfuscator☆216Updated 2 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆168Updated last year
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- ☆219Updated last year
- Bruteforces Fortinet SSL VPNs☆57Updated 2 years ago
- Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519☆84Updated 2 years ago
- Different methods to get current username without using whoami☆182Updated last year
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated last year
- Heavily obfuscated ASP web shell generation tool.☆172Updated last year
- Repo for all my exploits/PoCs☆53Updated 6 months ago