kaganisildak / c2tify
Using Spotify Playlists as Malware CDN
☆26Updated 4 years ago
Alternatives and similar repositories for c2tify:
Users that are interested in c2tify are comparing it to the libraries listed below
- Modular reverse shell server with a Discord frontend and example payloads☆28Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- Windows Privilege Escalation☆28Updated 4 years ago
- ☆30Updated 4 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- ☆27Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- Notes for Assembly language☆14Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- Active Directory Penetration Testing Tool☆27Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆31Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- powershell tool for VM evasion☆43Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 4 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Sources code extracted from malwares for analysis☆36Updated 2 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆20Updated 4 months ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆23Updated 6 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year
- Malware vulnerability research. Coming soon..☆12Updated 4 years ago