govindasamyarun / c2-cloudLinks
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
☆121Updated last year
Alternatives and similar repositories for c2-cloud
Users that are interested in c2-cloud are comparing it to the libraries listed below
Sorting:
- An aggressor script that can help automate payload building in Cobalt Strike☆118Updated last year
- Reverse shell that can bypass windows defender detection☆167Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated last year
- PowerShell Obfuscator☆184Updated last year
- ☆42Updated 11 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆80Updated 6 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆106Updated 2 months ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- Active Directory Penetration Testing for Red Teams☆59Updated 10 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆188Updated 11 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆50Updated last year
- Encoder PHP webshell to bypass WAF using XOR operations.☆53Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆119Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution☆75Updated last year
- ☆220Updated last year
- Heavily obfuscated ASP web shell generation tool.☆170Updated last year
- Dump Windows SAM hashes☆42Updated 2 years ago
- Different methods to get current username without using whoami☆178Updated last year
- Repo for all my exploits/PoCs☆51Updated 3 months ago
- A Linux persistence tool!☆155Updated last year
- ☆56Updated 3 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆73Updated last year
- ☆166Updated last year
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆89Updated 9 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆163Updated last year
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultan…☆232Updated 2 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated last year
- A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate f…☆82Updated 11 months ago