j3ssie / c2s
Command and Control server on Slack
☆27Updated 5 years ago
Alternatives and similar repositories for c2s:
Users that are interested in c2s are comparing it to the libraries listed below
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 4 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- A productivity burp extension which reminds to take break while you are at work!☆17Updated 4 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- URL-encode data streams via commandline☆14Updated 5 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆21Updated 2 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆18Updated 6 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆21Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 8 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 3 years ago
- ☆34Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Simple C2 over the Trello API☆37Updated 2 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 5 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- All the information provided on this site is for educational purposes only.☆17Updated 10 months ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆24Updated 5 years ago