machine1337 / gmailc2
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
☆464Updated last year
Alternatives and similar repositories for gmailc2:
Users that are interested in gmailc2 are comparing it to the libraries listed below
- Command & Control-Framework created for collaboration in python3☆313Updated last year
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆334Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆275Updated 6 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆514Updated 11 months ago
- Killer is a simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆774Updated 6 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆324Updated last month
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆403Updated last year
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆439Updated 3 weeks ago
- Script for generating revshells☆457Updated 4 months ago
- POC Pdf-exploit builder on C#☆129Updated 10 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆310Updated last week
- ☆682Updated 9 months ago
- Remote persistent 🔑Logger for Windows and Linux☆298Updated last year
- ☆120Updated 9 months ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆344Updated 11 months ago
- ☆285Updated last year
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆152Updated last year
- PowerShell Ransomware Simulator with C2 Server☆476Updated 11 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆650Updated 8 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆240Updated last year
- AV evading OSX Backdoor and Crypter Framework☆277Updated 10 months ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆256Updated last year
- Generate FUD backdoors☆242Updated last year
- ☆277Updated 7 months ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆385Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆501Updated 5 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆293Updated last year
- Reverse shell that can bypass windows defender detection☆159Updated 11 months ago