govindasamyarun / c2-cloud
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
β105Updated last year
Alternatives and similar repositories for c2-cloud:
Users that are interested in c2-cloud are comparing it to the libraries listed below
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ115Updated last year
- Heavily obfuscated ASP web shell generation tool.β159Updated 10 months ago
- Reverse shell that can bypass windows defender detectionβ161Updated last year
- PowerShell Obfuscatorβ115Updated 9 months ago
- β214Updated last year
- Dumping lsass without mimikatz with the exfiltration of the data using FAKE ntp packetsβ79Updated this week
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β151Updated 10 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ53Updated last year
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.β117Updated 8 months ago
- Different methods to get current username without using whoamiβ174Updated last year
- Continuous password spraying toolβ174Updated 3 weeks ago
- A shellcode injection tool showcasing various process injection techniquesβ134Updated last year
- β162Updated last year
- β152Updated 8 months ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCEβ192Updated 4 months ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profilesβ196Updated 9 months ago
- Offensive MSSQL toolkit written in Python, based off SQLReconβ201Updated 2 months ago
- A Tool that aims to evade av with binary paddingβ147Updated 8 months ago
- Escalate Service Account To LocalSystem via Kerberosβ393Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ145Updated 10 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike β a Go-based tool for ethical hacking and Red Team operationβ¦β178Updated 6 months ago
- TeamServer and Client of Exploration Command and Control Frameworkβ111Updated this week
- β42Updated 5 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434β250Updated 7 months ago
- Evasive Golang Loaderβ129Updated 7 months ago
- AV bypass while you sip your Chai!β218Updated 10 months ago
- tomcat CVE-2024-50379/CVE-2024-56337 ζ‘δ»Άη«δΊζδ»ΆδΈδΌ expβ83Updated 3 months ago
- β137Updated last year