A Golang implant that uses Slack as a command and control server
☆47Jun 10, 2020Updated 5 years ago
Alternatives and similar repositories for Slackor
Users that are interested in Slackor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆47Mar 13, 2023Updated 3 years ago
- ☆28May 25, 2021Updated 4 years ago
- ☆50May 12, 2021Updated 4 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- Discord as a C2☆49Jan 4, 2021Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆124Dec 27, 2020Updated 5 years ago
- A Golang implant that uses Slack as a command and control server☆462Feb 25, 2023Updated 3 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- ☆68May 22, 2023Updated 2 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and …☆77Nov 5, 2022Updated 3 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆415Dec 19, 2020Updated 5 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- Obfuscates a Python Script and the accompanying Shellcode.☆56Dec 30, 2019Updated 6 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆67Sep 4, 2023Updated 2 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆308Oct 27, 2017Updated 8 years ago
- Haxmas-2017 LD_PRELOAD rootkit in Golang☆19Dec 28, 2017Updated 8 years ago
- Python3 Metasploit automation library☆24Dec 8, 2022Updated 3 years ago
- Tool to deploy a post-exploitation prompt at any time☆321May 28, 2021Updated 4 years ago
- [POC] Asynchronous reverse shell using the HTTP protocol.☆272May 23, 2025Updated 10 months ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 9 months ago
- 🕳 godoh - A DNS-over-HTTPS C2☆805Dec 19, 2023Updated 2 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- Simple python backdoor with Ngrok tunnel support☆207Dec 9, 2023Updated 2 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆242Oct 3, 2023Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago