kunpen / Havoc-C2View external linksLinks
The Havoc Framework
☆63Sep 30, 2022Updated 3 years ago
Alternatives and similar repositories for Havoc-C2
Users that are interested in Havoc-C2 are comparing it to the libraries listed below
Sorting:
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- service location protocol amplified denial of service attack verification tool☆16Apr 25, 2023Updated 2 years ago
- A curated list of radio related open source projects. Your contributions are welcome.☆21Sep 14, 2025Updated 4 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- The Havoc Framework☆8,158Dec 18, 2025Updated last month
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆107Aug 11, 2023Updated 2 years ago
- de4dot mod by HTC & Ngôn Nguyễn☆28Aug 18, 2020Updated 5 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- A collection of Pyrogram Smart Plugins for Telegram bots☆23Mar 13, 2022Updated 3 years ago
- ☆29May 16, 2023Updated 2 years ago
- ☆39Mar 28, 2025Updated 10 months ago
- In-Memory Rootkit For Linux and BSD☆87Aug 9, 2025Updated 6 months ago
- ☆11Apr 16, 2025Updated 9 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆50May 22, 2025Updated 8 months ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Oct 18, 2023Updated 2 years ago
- ☆11Jan 22, 2021Updated 5 years ago
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆83Dec 30, 2025Updated last month
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- Not just discord, its a fully stealer, steal cc's, cookies, passwords and the others!☆11Sep 2, 2025Updated 5 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Spoofcheck☆45May 21, 2025Updated 8 months ago
- Adversary Emulation Framework☆10,673Updated this week
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆49Mar 19, 2022Updated 3 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- Safety Layer for LLM Database Interactions☆47Dec 31, 2025Updated last month
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- MHPKMS - Bảo vệ sản phẩm của bạn☆11Aug 19, 2023Updated 2 years ago
- Example of an ELF parser to learn about the ELF format☆10Oct 6, 2024Updated last year
- Control a Fanimation Slinger V2 RF Fan via an ESP8266 and a TI CC1101 chip over MQTT☆11Jan 29, 2025Updated last year
- Here are some tools I developed to help analyze malware☆12Nov 8, 2023Updated 2 years ago
- DAL (Data Access Layer) - a proxy for SQL databases with MongoDB inspired query interface☆11Sep 2, 2024Updated last year
- ☆14May 7, 2025Updated 9 months ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- A complete computer science study plan for becoming a software engineer☆11Mar 1, 2021Updated 4 years ago