Duct Tape Command and Control!
☆96Jul 17, 2025Updated 8 months ago
Alternatives and similar repositories for dtc2
Users that are interested in dtc2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stargate☆96Aug 6, 2016Updated 9 years ago
- Local osx dialog box phishing using osascript. Easier than keylogging on osx. Simply ask for the passwords you want.☆56Nov 1, 2018Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Linear IL view for Binary Ninja☆13Feb 28, 2017Updated 9 years ago
- An example command dropper in rust.☆13Jun 8, 2018Updated 7 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆88Jul 19, 2018Updated 7 years ago
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆872Aug 24, 2017Updated 8 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Project "Flashbang" - An open-source Flash-security helper☆205Apr 19, 2015Updated 10 years ago
- ☆19May 31, 2017Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- Bluetooth Recon Script☆24Nov 3, 2015Updated 10 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- ☆142May 24, 2024Updated last year
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Shodan HQ nmap plugin - passively scan targets☆157Mar 14, 2016Updated 10 years ago
- ☆76Jun 5, 2018Updated 7 years ago
- CTF Team -TeamRocketIST's website source code.☆17Aug 21, 2023Updated 2 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- ☆242Jun 15, 2024Updated last year
- PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking …☆87Jun 13, 2019Updated 6 years ago
- ☆50May 12, 2021Updated 4 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Automatizated bash script to invade WPA2 networks with wordlist method☆18Apr 8, 2019Updated 6 years ago