Command and Control server on Slack
☆29Jan 30, 2019Updated 7 years ago
Alternatives and similar repositories for c2s
Users that are interested in c2s are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- React UI☆11Jan 4, 2023Updated 3 years ago
- Collection of auxiliary command line tools☆83Sep 23, 2023Updated 2 years ago
- Docker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning☆103Mar 3, 2026Updated 3 weeks ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Burp Suite extension to discover assets from HTTP response.☆16May 18, 2021Updated 4 years ago
- CLI tools using Harpoon features☆24Nov 7, 2023Updated 2 years ago
- ☆25Feb 11, 2024Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title☆12Oct 16, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This is a simple CSRF Proof of Concept generator that supports multiple form encodings and methods☆33Jul 9, 2017Updated 8 years ago
- Burp extension that add a tab to edit Office Open XML document (xlsx,docx,pptx)☆13Jan 5, 2018Updated 8 years ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆62Jan 24, 2019Updated 7 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- Do some quick reconnaissance on a domain-based web-application☆13Jun 1, 2021Updated 4 years ago
- Date type in Golang☆31Mar 22, 2022Updated 4 years ago
- Docker image containing tor with auto ip rotate and possibility to select your exit region☆14Jan 6, 2019Updated 7 years ago
- testing123☆13Nov 23, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago
- OSINT tools and more but without API key☆1,495Feb 15, 2026Updated last month
- KeexyBox - The box to keep the Internet under your control☆16May 4, 2021Updated 4 years ago
- 本脚本旨在生成各类畸形URL链接,进行探测使用的payload,尝试绕过服务端ssrf限制。☆28Jan 9, 2019Updated 7 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23May 1, 2022Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Burp Intruder File Payload Generator☆18Oct 27, 2019Updated 6 years ago
- Credentials recovery project☆13Dec 15, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- 收集各种各样的exp☆11Aug 20, 2015Updated 10 years ago
- Burp Suite Importer - Connect to multiple web servers while populating the sitemap.☆47May 15, 2020Updated 5 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- Subdomain discovery using Sublist3r, certspotter, crt.sh , censys and amass . Subdomain bruteforcing using Gobuster and Resolve hosts usi…☆16Oct 8, 2024Updated last year
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago