kaganisildak / c2tifyLinks
Using Spotify Playlists as Malware CDN
☆27Updated 4 years ago
Alternatives and similar repositories for c2tify
Users that are interested in c2tify are comparing it to the libraries listed below
Sorting:
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆74Updated 4 years ago
- material for exploit development☆17Updated 6 years ago
- Winsock accept() Backdoor Implant.☆116Updated 4 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 8 months ago
- Modular reverse shell server with a Discord frontend and example payloads☆28Updated 5 years ago
- Windows Privilege Escalation☆30Updated 5 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated 2 years ago
- ☆27Updated 6 years ago
- Metamorphic Code Generator & Loader☆15Updated 4 years ago
- Tools that trigger False Positive AV alerts☆50Updated 8 months ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆22Updated 6 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- ☆16Updated 4 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago