kaganisildak / c2tify
Using Spotify Playlists as Malware CDN
☆27Updated 4 years ago
Alternatives and similar repositories for c2tify:
Users that are interested in c2tify are comparing it to the libraries listed below
- Modular reverse shell server with a Discord frontend and example payloads☆28Updated 5 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 2 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Updated 3 years ago
- Windows Privilege Escalation☆28Updated 4 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 2 years ago
- material for exploit development☆17Updated 6 years ago
- ☆27Updated 4 years ago
- Notes for Assembly language☆14Updated 4 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Carbon Black Response IR tool☆53Updated 4 years ago
- ☆18Updated 3 years ago
- ☆11Updated 2 years ago
- Active Directory Penetration Testing Tool☆27Updated 3 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- ☆30Updated 4 years ago
- Deployment code for ashirt-server☆19Updated last year
- 👽 Exploits written for research purposes.☆11Updated 3 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- PoC for Zerologon (CVE-2020-1472) - Exploit☆8Updated 4 years ago
- My Malware Analysis Reports☆20Updated 2 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year