Duct Tape Command and Control!
☆96Jul 17, 2025Updated 7 months ago
Alternatives and similar repositories for dtc2
Users that are interested in dtc2 are comparing it to the libraries listed below
Sorting:
- Stargate☆96Aug 6, 2016Updated 9 years ago
- Local osx dialog box phishing using osascript. Easier than keylogging on osx. Simply ask for the passwords you want.☆56Nov 1, 2018Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- An example command dropper in rust.☆13Jun 8, 2018Updated 7 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆87Jul 19, 2018Updated 7 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆873Aug 24, 2017Updated 8 years ago
- ☆142May 24, 2024Updated last year
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- ☆19May 31, 2017Updated 8 years ago
- Bluetooth Recon Script☆24Nov 3, 2015Updated 10 years ago
- WAyereless Site SUrveying Program☆12Feb 9, 2016Updated 10 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Execute system calls over the network☆11Nov 17, 2014Updated 11 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Scans for accessibility tools backdoors via RDP☆341Mar 16, 2018Updated 7 years ago
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- ☆78May 24, 2018Updated 7 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- Linear IL view for Binary Ninja☆13Feb 28, 2017Updated 9 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 6 years ago
- Some stuff about the TCP flags field in NetFlow/IPFIX Data☆12Dec 31, 2015Updated 10 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- ☆76Jun 5, 2018Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Examples of various Entra ID scenarios in Terraform☆17Sep 24, 2024Updated last year