C2 server to connect to a victim machine via reverse shell
☆56Feb 27, 2022Updated 4 years ago
Alternatives and similar repositories for C2_Server
Users that are interested in C2_Server are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Feb 8, 2023Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- A program to steal user information through a simple link☆14May 19, 2023Updated 2 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Retrieve IP Geolocation information☆13Feb 20, 2021Updated 5 years ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆16Apr 26, 2022Updated 3 years ago
- CVE-2022-30525 Zyxel 防火墙命令注入漏洞 POC&EXPC☆12May 28, 2022Updated 3 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆26Feb 19, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An Obsidian.md theme inspired by the Cosmodium CyberSecurity colorway.☆19Mar 5, 2024Updated 2 years ago
- ☆17Mar 22, 2026Updated 3 weeks ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆10Nov 4, 2022Updated 3 years ago
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Remote Email Keylogger☆14Jun 2, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Android Hacking Framework to generate apk with backdoor, Works on both WAN and LAN☆19Jun 19, 2022Updated 3 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Jul 1, 2021Updated 4 years ago
- Learning notes of amazing Sliver C2 project.☆25Apr 14, 2023Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- ☆13Jun 10, 2022Updated 3 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- ☆11Aug 27, 2020Updated 5 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A javascript based botnet/C&C to remotely manage/control browsers.☆24Feb 4, 2022Updated 4 years ago
- A Go tool to obfuscate and deobfuscate the code and file.☆13May 29, 2022Updated 3 years ago
- Injects shellcode into remote processes using direct syscalls☆77Dec 30, 2020Updated 5 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- ☆24Mar 20, 2023Updated 3 years ago
- Steals telegram session(without any notifications) and google chrome credentials. Sending via telegram bot. Definitely works in 2020 with…☆15Sep 17, 2022Updated 3 years ago