pratiksingh94 / mesh-c2Links
P2P Mesh C2 framework (C implants + Python server + Dashboard) for resilient red‑team ops
☆12Updated 4 months ago
Alternatives and similar repositories for mesh-c2
Users that are interested in mesh-c2 are comparing it to the libraries listed below
Sorting:
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆78Updated 8 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 10 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 6 months ago
- CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26☆10Updated last year
- ☆45Updated 2 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 7 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆66Updated last year
- FortiWeb CVE-2025-25257 exploit☆63Updated 5 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆75Updated last week
- ☆79Updated 8 months ago
- ☆74Updated 11 months ago
- Unauthenticated RCE in ZoneMinder Snapshots - Poc Exploit☆20Updated last year
- Sliver extension to bypass UAC via cmstp written in rust☆34Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 7 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆69Updated last week
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆90Updated 4 months ago
- What the name says....☆104Updated last year
- ☆20Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆206Updated 3 months ago
- ☆164Updated last month
- Firebase Misconfiguration Detection Toolkit - To be presented at Blackhat EU Arsenal☆38Updated last month
- ☆25Updated last year
- A dirty PoC for a reverse shell with cool features in Rust☆188Updated last month
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆119Updated last week
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆97Updated last year
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆65Updated last year
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- PoC that downloads an executable from a public SSL certificate☆136Updated 5 months ago