A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
☆480Sep 17, 2025Updated 7 months ago
Alternatives and similar repositories for gmailc2
Users that are interested in gmailc2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Jun 27, 2023Updated 2 years ago
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆264Sep 26, 2025Updated 7 months ago
- A C# Command & Control framework☆1,032Mar 28, 2024Updated 2 years ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques and used by Patchwork group.☆836Jul 2, 2024Updated last year
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆434Sep 17, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Command and Control (C2)☆302May 4, 2023Updated 2 years ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆368Sep 17, 2025Updated 7 months ago
- Generate Undetectable Metasploit Payload in a simple way☆37Dec 19, 2023Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆387Jun 21, 2023Updated 2 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆504May 16, 2023Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Oct 21, 2023Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆275Jan 18, 2023Updated 3 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆406Feb 6, 2023Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆507Dec 19, 2023Updated 2 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆503Jan 10, 2023Updated 3 years ago
- HVNC for Cobalt Strike☆1,322Dec 7, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆742May 19, 2023Updated 2 years ago
- Nimbo-C2 is yet another (simple and lightweight) C2 framework☆445Jan 29, 2026Updated 3 months ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,565Aug 20, 2024Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆180Feb 10, 2023Updated 3 years ago
- UAC Bypass By Abusing Kerberos Tickets☆508Aug 10, 2023Updated 2 years ago
- An XSS Exploitation Tool☆339Dec 5, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆245Sep 19, 2023Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆237Jun 22, 2023Updated 2 years ago
- Terminate AV/EDR Processes using kernel driver☆354Jun 12, 2023Updated 2 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆337Feb 3, 2023Updated 3 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆229Jun 6, 2023Updated 2 years ago
- Shellcode Loader with Indirect Dynamic syscall Implementation , shellcode in MAC format, API resolving from PEB, Syscall calll and syscal…☆323Aug 2, 2023Updated 2 years ago
- C# obfuscator that bypass windows defender☆819Jun 4, 2023Updated 2 years ago
- Weaponized HellsGate/SigFlip☆207Jun 7, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆373Dec 24, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This map lists the essential techniques to bypass anti-virus and EDR☆3,253Mar 28, 2025Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆721Aug 18, 2023Updated 2 years ago
- A Simple Script For SSH BruteForce☆38Aug 4, 2023Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,412Nov 22, 2023Updated 2 years ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆1,028Aug 29, 2023Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 3 years ago