govindasamyarun / c2-cloudLinks
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
β117Updated last year
Alternatives and similar repositories for c2-cloud
Users that are interested in c2-cloud are comparing it to the libraries listed below
Sorting:
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ117Updated last year
- Reverse shell that can bypass windows defender detectionβ166Updated last year
- Heavily obfuscated ASP web shell generation tool.β164Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β98Updated last week
- β164Updated last year
- GeoServer Remote Code Executionβ81Updated 2 months ago
- PowerShell Obfuscatorβ178Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environmentβ¦β141Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ54Updated last year
- β42Updated 8 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructureβ140Updated last year
- PDF dropper Red Team Scenairosβ212Updated 10 months ago
- A Tool that aims to evade av with binary paddingβ152Updated 11 months ago
- Encoder PHP webshell to bypass WAF using XOR operations.β53Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ96Updated last year
- β53Updated last month
- β154Updated 11 months ago
- Different methods to get current username without using whoamiβ177Updated last year
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.β125Updated 11 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β153Updated last year
- CVE-2024-3400-RCEβ87Updated last year
- β220Updated last year
- β113Updated last year
- Persistent Powershell backdoor tool {π}β119Updated 10 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β62Updated 10 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.β50Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCEβ194Updated 7 months ago
- β68Updated 5 months ago