j3ssie / c2sLinks
Command and Control server on Slack
☆28Updated 6 years ago
Alternatives and similar repositories for c2s
Users that are interested in c2s are comparing it to the libraries listed below
Sorting:
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 7 years ago
- An Extended, Modulair, Host Discovery Framework☆43Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- notorious BIG IP☆15Updated 5 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- ☆20Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- ☆33Updated 4 months ago
- My notebook for OSCP Lab☆25Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated 2 years ago
- ☆19Updated 8 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆17Updated 6 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Updated 6 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year