kaganisildak / c2tifyLinks
Using Spotify Playlists as Malware CDN
☆26Updated 5 years ago
Alternatives and similar repositories for c2tify
Users that are interested in c2tify are comparing it to the libraries listed below
Sorting:
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- material for exploit development☆18Updated 6 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- Winsock accept() Backdoor Implant.☆118Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- Modular reverse shell server with a Discord frontend and example payloads☆28Updated 5 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 4 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 5 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 6 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- Metamorphic Code Generator & Loader☆15Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- ☆16Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 5 years ago
- ☆54Updated 4 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Updated 5 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- An async Python client library for Empire's RESTful API☆26Updated 2 years ago