govindasamyarun / c2-cloud
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
β114Updated last year
Alternatives and similar repositories for c2-cloud:
Users that are interested in c2-cloud are comparing it to the libraries listed below
- Reverse shell that can bypass windows defender detectionβ166Updated last year
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ116Updated last year
- Heavily obfuscated ASP web shell generation tool.β161Updated last year
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultanβ¦β216Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike β a Go-based tool for ethical hacking and Red Team operationβ¦β180Updated 8 months ago
- β163Updated last year
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Solβ¦β92Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β151Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- β113Updated last year
- Awesome AV/EDR/XDR Bypass Tipsβ271Updated 2 years ago
- PowerShell Obfuscatorβ172Updated 11 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575β87Updated 5 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environmentβ¦β139Updated 11 months ago
- β42Updated 7 months ago
- GeoServer Remote Code Executionβ78Updated last month
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.β49Updated 11 months ago
- A collection of Cobalt Strike Aggressor scripts.β95Updated 3 years ago
- Active Directory Penetration Testing for Red Teamsβ58Updated 7 months ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluenceβ75Updated last year
- Different methods to get current username without using whoamiβ174Updated last year
- CVE-2024-3400-RCEβ87Updated last year
- A Tool that aims to evade av with binary paddingβ148Updated 10 months ago
- Escalate Service Account To LocalSystem via Kerberosβ395Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ136Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762β101Updated 10 months ago
- β215Updated last year
- PDF dropper Red Team Scenairosβ205Updated 9 months ago
- β164Updated last year