A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.
☆45Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for spellbound
Users that are interested in spellbound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- About This Repository Contains fully Integrated functional code file for project completed by my group on obfuscation of payloads and cre…☆14Sep 19, 2023Updated 2 years ago
- A GUI based String matching algorithm implementation to find any string from no. of files in the provided path.☆13Sep 19, 2023Updated 2 years ago
- A Fully Functional and Integrated Online Banking Application.☆13Sep 19, 2023Updated 2 years ago
- ☆12Sep 24, 2023Updated 2 years ago
- A Fully Functional and integrated leraning management system.☆14Nov 22, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automated python scripts for customized packet creation and modeling DOS attack, Port scanning (XMAS, HALF, FULL) and Reverse Shell creat…☆14Sep 19, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆44Jun 27, 2023Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆54Jul 15, 2023Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆45Oct 2, 2023Updated 2 years ago
- Encodes a payload within a generated mock-CSS file☆59Sep 18, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆36Oct 31, 2023Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆72Jun 11, 2024Updated last year
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple Powershell Http shell With WEB UI☆74Mar 28, 2025Updated last year
- I am using these OSINT tools. This list include important domains of OSINT and their respective tools.☆109Jun 22, 2023Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Jul 25, 2023Updated 2 years ago
- A C2 framework built for my bachelors thesis☆57Jan 14, 2026Updated 3 months ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆27Jul 21, 2023Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Nov 12, 2023Updated 2 years ago
- EternalHush - java-based open-source c2 framework that targets Microsoft Windows☆19Apr 14, 2026Updated 3 weeks ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆162Feb 22, 2024Updated 2 years ago
- OSINT tool to download all the previous bitmoji's of any snapchat user. Website is free hosting so it takes some time to load. Be patient☆47Oct 3, 2024Updated last year
- ☆79Aug 2, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 3 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- ☆164Sep 26, 2023Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆74Oct 28, 2023Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆90Nov 9, 2023Updated 2 years ago
- Find DLLs with RWX section☆80Jul 3, 2023Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- ☆224Mar 10, 2024Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆165Apr 27, 2024Updated 2 years ago