infosecn1nja / C3Links
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
☆12Updated 4 years ago
Alternatives and similar repositories for C3
Users that are interested in C3 are comparing it to the libraries listed below
Sorting:
- ☆28Updated last year
- Custom pentesting tools☆25Updated 4 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆14Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆91Updated last year
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- ☆53Updated 4 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 3 weeks ago
- ☆33Updated 7 months ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆99Updated 5 years ago
- Repository of tools used in my blog☆52Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆29Updated 5 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- ☆12Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago