Just another useless C2 occupying space in some HDD somewhere.
☆21Jul 4, 2023Updated 2 years ago
Alternatives and similar repositories for palinka_c2
Users that are interested in palinka_c2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆74Apr 25, 2023Updated 2 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 7 years ago
- ☆28May 25, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆68May 22, 2023Updated 2 years ago
- Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527☆19Jul 12, 2021Updated 4 years ago
- Discord as a C2☆49Jan 4, 2021Updated 5 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated 2 weeks ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆122May 30, 2022Updated 3 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Research into WinSxS binaries and finding hijackable paths☆30Dec 7, 2025Updated 3 months ago
- The most average C2 ever (MACE)☆97Apr 9, 2022Updated 3 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- ☆10Mar 17, 2026Updated last week
- ☆169Dec 8, 2022Updated 3 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- Powershell sandboxing utility☆20Mar 2, 2026Updated 3 weeks ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆124Dec 27, 2020Updated 5 years ago
- Windows & linux Echo to file command converter☆25Jun 18, 2021Updated 4 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆218Dec 8, 2022Updated 3 years ago
- ☆28Mar 29, 2022Updated 3 years ago
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- A Golang implant that uses Slack as a command and control server☆47Jun 10, 2020Updated 5 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆67Sep 4, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- ☆13Feb 6, 2022Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- ☆16Dec 20, 2021Updated 4 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Nov 10, 2022Updated 3 years ago
- VBScript minifier☆25Mar 19, 2026Updated last week