govindasamyarun / c2-cloudLinks
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
☆126Updated last year
Alternatives and similar repositories for c2-cloud
Users that are interested in c2-cloud are comparing it to the libraries listed below
Sorting:
- Reverse shell that can bypass windows defender detection☆169Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆118Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆145Updated 2 years ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆190Updated last year
- ☆42Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- A Linux persistence tool!☆160Updated 4 months ago
- PowerShell Obfuscator☆225Updated 4 months ago
- CVE-2023-22515: Confluence Broken Access Control Exploit☆146Updated 2 months ago
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆125Updated last year
- Active Directory Penetration Testing for Red Teams☆58Updated last year
- ☆59Updated 8 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆172Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- Dark-Shell is a Tool for Generating ReverShell File☆116Updated 2 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆84Updated 10 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆122Updated 7 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- Chrome browser extension-based Command & Control☆229Updated 6 months ago
- GeoServer Remote Code Execution☆86Updated 9 months ago
- Different methods to get current username without using whoami☆183Updated last year
- A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate f…☆85Updated 2 months ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆77Updated 2 years ago
- Heavily obfuscated ASP web shell generation tool.☆175Updated last year
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultan…☆247Updated 2 years ago
- cve-2024-42327 ZBX-25623☆36Updated last year
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Updated 2 years ago
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution☆78Updated last year