govindasamyarun / c2-cloudLinks
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
☆126Updated last year
Alternatives and similar repositories for c2-cloud
Users that are interested in c2-cloud are comparing it to the libraries listed below
Sorting:
- An aggressor script that can help automate payload building in Cobalt Strike☆117Updated last year
- Reverse shell that can bypass windows defender detection☆168Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated 2 years ago
- ☆42Updated last year
- PowerShell Obfuscator☆225Updated 4 months ago
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆201Updated last year
- ☆112Updated 2 years ago
- ☆59Updated 7 months ago
- A Linux persistence tool!☆160Updated 3 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆120Updated 6 months ago
- Different methods to get current username without using whoami☆183Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆172Updated last year
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultan…☆246Updated 2 years ago
- Active Directory Penetration Testing for Red Teams☆58Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆189Updated last year
- Chrome browser extension-based Command & Control☆224Updated 5 months ago
- ☆221Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- ☆167Updated 2 years ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆84Updated 10 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆144Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆70Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- Heavily obfuscated ASP web shell generation tool.☆174Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate f…☆84Updated last month
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆280Updated 10 months ago