govindasamyarun / c2-cloudLinks
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
β122Updated last year
Alternatives and similar repositories for c2-cloud
Users that are interested in c2-cloud are comparing it to the libraries listed below
Sorting:
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated last year
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β158Updated 2 years ago
- Reverse shell that can bypass windows defender detectionβ169Updated last year
- β42Updated last year
- Documents Exfiltration project for fun and educational purposesβ143Updated 2 years ago
- β113Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike β a Go-based tool for ethical hacking and Red Team operationβ¦β188Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β118Updated 4 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·β82Updated 8 months ago
- Active Directory Penetration Testing for Red Teamsβ58Updated last year
- β219Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β110Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β154Updated last year
- Different methods to get current username without using whoamiβ177Updated last year
- Dump Windows SAM hashesβ42Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ53Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated last year
- Bruteforces Fortinet SSL VPNsβ57Updated 2 years ago
- A Linux persistence tool!β158Updated last month
- β58Updated 6 months ago
- PowerShell Obfuscatorβ211Updated 2 months ago
- A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate fβ¦β83Updated last year
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profilesβ199Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ148Updated last year
- β165Updated 2 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluenceβ75Updated 2 years ago
- Enhanced version of secretsdump.py from Impacket. Adds multi-threading and accepts an input file with a list of target hosts for simultanβ¦β241Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.β52Updated last year
- CVE-2023-22515: Confluence Broken Access Control Exploitβ137Updated 2 years ago
- Chrome browser extension-based Command & Controlβ183Updated 3 months ago