kaganisildak / c2tifyLinks
Using Spotify Playlists as Malware CDN
☆27Updated 4 years ago
Alternatives and similar repositories for c2tify
Users that are interested in c2tify are comparing it to the libraries listed below
Sorting:
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- Winsock accept() Backdoor Implant.☆118Updated 4 years ago
- Metamorphic Code Generator & Loader☆15Updated 5 years ago
- material for exploit development☆17Updated 6 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆39Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Updated 4 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆22Updated 6 years ago
- ☆30Updated 5 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Updated 2 years ago
- Modular reverse shell server with a Discord frontend and example payloads☆28Updated 5 years ago
- Windows Privilege Escalation☆30Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- ☆28Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated last year
- Fast and intuitive manager for multiple reverse shells☆86Updated last year
- powershell tool for VM evasion☆42Updated 5 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 5 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 6 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆78Updated 6 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆144Updated 4 years ago
- Tools that trigger False Positive AV alerts☆53Updated 11 months ago
- Post-exploitation tool for attacking Active Directory domain controllers☆19Updated 2 years ago
- PowerShell payload generator☆118Updated 4 years ago