Command and Control server on Slack
☆29Jan 30, 2019Updated 7 years ago
Alternatives and similar repositories for c2s
Users that are interested in c2s are comparing it to the libraries listed below
Sorting:
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- Burp Suite extension to discover assets from HTTP response.☆16May 18, 2021Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- CLI tools using Harpoon features☆24Nov 7, 2023Updated 2 years ago
- Batch scripts to capture volatile and log information from a target system☆21Oct 9, 2014Updated 11 years ago
- Collection of auxiliary command line tools☆83Sep 23, 2023Updated 2 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23May 1, 2022Updated 3 years ago
- ☆25Feb 11, 2024Updated 2 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- The Pentester's Swiss Army Knife☆26Jan 25, 2020Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Docker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning☆102Jan 29, 2026Updated last month
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- This is a simple CSRF Proof of Concept generator that supports multiple form encodings and methods☆33Jul 9, 2017Updated 8 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- ☆16Feb 7, 2025Updated last year
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - Unit Tests for your Network -☆44Mar 29, 2019Updated 6 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/xml2rfc-xxe☆11Jul 9, 2022Updated 3 years ago
- black Ip lists, dorks-collection☆16Updated this week
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- A CLI tool for migrating from Mattermost to Matrix Synapse with multi-step, resumable migration support.☆19Feb 4, 2026Updated last month
- A python script for automating the collection of web pages with Hunchly.☆11Jan 11, 2021Updated 5 years ago