kleiton0x00 / RedditC2Links
Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic look legit.
☆268Updated 2 years ago
Alternatives and similar repositories for RedditC2
Users that are interested in RedditC2 are comparing it to the libraries listed below
Sorting:
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆280Updated 2 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆202Updated last year
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆255Updated 3 years ago
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆266Updated 3 months ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆111Updated 8 months ago
- A basic c2 / agent.☆120Updated 5 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆477Updated 3 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆318Updated last month
- ☆99Updated 3 years ago
- Collection of random RedTeam scripts.☆211Updated last year
- ☆412Updated 2 years ago
- ☆215Updated 2 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆531Updated last month
- Shellcode launcher for AV bypass☆215Updated 2 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆227Updated 11 months ago
- PowerShell Asynchronous TCP Reverse Shell☆158Updated last month
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆280Updated 10 months ago
- ☆243Updated last year
- Just an AV slayer. Nothing special ;)☆216Updated 3 years ago
- ☆167Updated 3 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆239Updated 2 years ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆391Updated last year
- This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)☆287Updated last year
- DNS Tunneling using powershell to download and execute a payload. Works in CLM.☆231Updated 3 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆144Updated 2 years ago
- Kill AV/EDR leveraging BYOVD attack☆388Updated 2 years ago
- LDAP enumeration tool implemented in Python3☆224Updated 7 months ago
- Roast in the Middle☆295Updated 3 months ago
- Hiding GoPhish from the boys in blue☆200Updated 3 years ago
- ☆290Updated 2 years ago