Application for detecting command and control (C2) communication through network traffic analysis.
☆15May 12, 2023Updated 2 years ago
Alternatives and similar repositories for C2Detective
Users that are interested in C2Detective are comparing it to the libraries listed below
Sorting:
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- Awesome list of Living off the Land (LOL) methods, tools, and features commonly abused by attackers☆34Feb 28, 2026Updated last week
- Carbon Black Response IR tool☆55Dec 10, 2020Updated 5 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆30Dec 22, 2021Updated 4 years ago
- ULPatch is open source user space live patch tool.☆13Jan 11, 2026Updated last month
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- ☆44Feb 26, 2024Updated 2 years ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- This Projects aims at building realtime Dashboard for managing tasks with Pusher, Laravel and vuejs☆12May 29, 2018Updated 7 years ago
- Java decompilation & deobfuscation lab - dockerized toolset☆15Mar 1, 2026Updated last week
- Custom Python 2.7 RAT☆10May 25, 2016Updated 9 years ago
- Coding Roblox Games Made Easy - 2nd Edition, Published by Packt☆36Jul 3, 2024Updated last year
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated last year
- Inject shellcode into a valid BMP/GIF image.☆34Sep 7, 2020Updated 5 years ago
- A way to use fonts to obfuscate text.☆50Dec 22, 2022Updated 3 years ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Statistics from our binary transformation framework☆11Jan 16, 2025Updated last year
- PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection☆10Apr 12, 2022Updated 3 years ago
- Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shell☆11Apr 18, 2022Updated 3 years ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 17, 2026Updated 2 weeks ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- A copy trading tool for Binance☆10Nov 2, 2020Updated 5 years ago
- Smart Sessions with EIP-7702 EOA☆16Nov 15, 2024Updated last year
- Silly Android app to bypass stupid Facebook's limitation that forces user to use Messenger app to chat with contacts, instead of normal b…☆10Jun 15, 2016Updated 9 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- A PHP class for the Habitica API.☆17Sep 16, 2016Updated 9 years ago
- Work-in-progress for the official camera module from the Raspberry Pi Foundation☆30Jan 11, 2016Updated 10 years ago
- A Node.js wrapper for the ZenHub API☆11Mar 2, 2023Updated 3 years ago
- Tron Legacy colorscheme for common editors and terminal emulators☆10Feb 18, 2021Updated 5 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- Havoc C2 profile generator☆103Jul 15, 2025Updated 7 months ago
- Detect email phishing with Watson Natural Language Classifier☆38Jan 7, 2022Updated 4 years ago
- ☆10Oct 22, 2021Updated 4 years ago
- CVE-2022-23131漏洞利用工具开箱即用。☆11Apr 2, 2022Updated 3 years ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆10Jan 7, 2023Updated 3 years ago