govindasamyarun / c2-cloudLinks
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
☆122Updated last year
Alternatives and similar repositories for c2-cloud
Users that are interested in c2-cloud are comparing it to the libraries listed below
Sorting:
- An aggressor script that can help automate payload building in Cobalt Strike☆118Updated last year
- Reverse shell that can bypass windows defender detection☆169Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- ☆42Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆143Updated 2 years ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆190Updated last year
- ☆165Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆170Updated last year
- Heavily obfuscated ASP web shell generation tool.☆172Updated last year
- PowerShell Obfuscator☆221Updated 3 months ago
- ☆113Updated 2 years ago
- A Linux persistence tool!☆159Updated 2 months ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆200Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆160Updated last year
- ☆220Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆106Updated 3 years ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆106Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- Different methods to get current username without using whoami☆183Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆120Updated 5 months ago
- Active Directory Penetration Testing for Red Teams☆58Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆84Updated 9 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆204Updated 10 months ago
- MOVEit CVE-2023-34362☆138Updated 2 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Updated 2 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆279Updated 9 months ago
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultan…☆245Updated 2 years ago