CONTROL C2 is a command and control framework designed for red teamers and penetration testers.
☆15Oct 16, 2024Updated last year
Alternatives and similar repositories for Control_Framework
Users that are interested in Control_Framework are comparing it to the libraries listed below
Sorting:
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 weeks ago
- ☆19Nov 28, 2024Updated last year
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Nov 2, 2023Updated 2 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- ☆25Dec 7, 2024Updated last year
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 11 months ago
- This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators…☆29Apr 9, 2025Updated 10 months ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Mar 24, 2022Updated 3 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Aug 18, 2021Updated 4 years ago
- Harness the Power of AI for all your reporting needs.☆28Apr 17, 2023Updated 2 years ago
- ☆11Feb 28, 2022Updated 3 years ago
- ☆29May 8, 2021Updated 4 years ago
- ☆36Feb 14, 2023Updated 3 years ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 7 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆110Jun 16, 2025Updated 8 months ago
- ☆44Oct 11, 2025Updated 4 months ago
- Exploit for the CVE-2024-5806☆45Jun 24, 2024Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- ☆14Jul 12, 2019Updated 6 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- ☆18Sep 9, 2025Updated 5 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 7 months ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago