A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.
☆45Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for spellbound
Users that are interested in spellbound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- About This Repository Contains fully Integrated functional code file for project completed by my group on obfuscation of payloads and cre…☆14Sep 19, 2023Updated 2 years ago
- A GUI based String matching algorithm implementation to find any string from no. of files in the provided path.☆13Sep 19, 2023Updated 2 years ago
- A Fully Functional and Integrated Online Banking Application.☆13Sep 19, 2023Updated 2 years ago
- ☆12Sep 24, 2023Updated 2 years ago
- A Fully Functional and integrated leraning management system.☆14Nov 22, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automated python scripts for customized packet creation and modeling DOS attack, Port scanning (XMAS, HALF, FULL) and Reverse Shell creat…☆14Sep 19, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆44Jun 27, 2023Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆53Jul 15, 2023Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆45Oct 2, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Encodes a payload within a generated mock-CSS file☆59Sep 18, 2023Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆72Jun 11, 2024Updated last year
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Simple Powershell Http shell With WEB UI☆74Mar 28, 2025Updated 11 months ago
- I am using these OSINT tools. This list include important domains of OSINT and their respective tools.☆109Jun 22, 2023Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Jul 25, 2023Updated 2 years ago
- A C2 framework built for my bachelors thesis☆57Jan 14, 2026Updated 2 months ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆27Jul 21, 2023Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- EternalHush - java-based open-source c2 framework that targets Microsoft Windows☆20Feb 10, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆162Feb 22, 2024Updated 2 years ago
- OSINT tool to download all the previous bitmoji's of any snapchat user. Website is free hosting so it takes some time to load. Be patient☆46Oct 3, 2024Updated last year
- ☆79Aug 2, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- ☆163Sep 26, 2023Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆73Oct 28, 2023Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆90Nov 9, 2023Updated 2 years ago
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- ☆223Mar 10, 2024Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- ☆22Jul 15, 2023Updated 2 years ago