Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software
☆67Sep 4, 2023Updated 2 years ago
Alternatives and similar repositories for DarkFinger-C2
Users that are interested in DarkFinger-C2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28May 25, 2021Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated 2 weeks ago
- Reasonably undetected shellcode stager and executer.☆35May 23, 2025Updated 10 months ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- Basic C2 Server☆197Jul 3, 2021Updated 4 years ago
- ☆13Oct 20, 2021Updated 4 years ago
- Slack C2bot that executes commands and returns the output.☆48Mar 13, 2023Updated 3 years ago
- ☆68May 22, 2023Updated 2 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- ☆88Jul 31, 2022Updated 3 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆124Dec 27, 2020Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Apr 3, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- New UAC bypass for Silent Cleanup for CobaltStrike☆192Jul 14, 2021Updated 4 years ago
- a simple backdoor in Nim☆19Aug 6, 2021Updated 4 years ago
- ☆79Aug 2, 2023Updated 2 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- [POC] Asynchronous reverse shell using the HTTP protocol.☆272May 23, 2025Updated 10 months ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆122May 30, 2022Updated 3 years ago
- .NET project for installing Persistence☆63Feb 14, 2022Updated 4 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated last month
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- Injects shellcode into remote processes using direct syscalls☆77Dec 30, 2020Updated 5 years ago
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆186Jan 27, 2025Updated last year
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 5 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- ☆11May 30, 2021Updated 4 years ago
- Making Shellcode fully undetectable using uuid☆23May 7, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- Open source pre-operation C2 server based on python and powershell☆765Jul 6, 2021Updated 4 years ago
- uuid-shellcode-execution☆13May 9, 2021Updated 4 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- ☆61Feb 10, 2022Updated 4 years ago
- A Golang implant that uses Slack as a command and control server☆47Jun 10, 2020Updated 5 years ago
- Overwrite a process's recovery callback and execute with WER☆101Apr 17, 2022Updated 3 years ago