reveng007 / C2_Server
C2 server to connect to a victim machine via reverse shell
☆51Updated 2 years ago
Alternatives and similar repositories for C2_Server:
Users that are interested in C2_Server are comparing it to the libraries listed below
- Undetectable payload for Windows 10 and 11☆40Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆74Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆25Updated 2 years ago
- A C2 framework built for my bachelors thesis☆56Updated 3 months ago
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆42Updated 7 years ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆240Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆104Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆122Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆124Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆31Updated 2 years ago
- Hades Basic Command & Control Server☆84Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆58Updated 3 years ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated 11 months ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆88Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆42Updated last month
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆65Updated last year
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆157Updated last year
- 「🛡️」AVs/EDRs Evasion tool☆93Updated 2 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shell☆39Updated last year
- This is for Ethical Use only!☆28Updated 2 weeks ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆63Updated last year
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆102Updated this week
- PDF dropper Red Team Scenairos☆182Updated 6 months ago