C2 server to connect to a victim machine via reverse shell
☆55Feb 27, 2022Updated 4 years ago
Alternatives and similar repositories for C2_Server
Users that are interested in C2_Server are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Feb 8, 2023Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆267Dec 6, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- A program to steal user information through a simple link☆13May 19, 2023Updated 2 years ago
- Retrieve IP Geolocation information☆13Feb 20, 2021Updated 5 years ago
- 🚀 Builder of Malware Loader☆12Nov 12, 2020Updated 5 years ago
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆16Apr 26, 2022Updated 4 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆26Feb 19, 2021Updated 5 years ago
- ☆17Mar 22, 2026Updated last month
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆11Nov 4, 2022Updated 3 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆16Sep 8, 2023Updated 2 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Dec 13, 2023Updated 2 years ago
- Remote Email Keylogger☆14Jun 2, 2022Updated 3 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- Android Hacking Framework to generate apk with backdoor, Works on both WAN and LAN☆19Jun 19, 2022Updated 3 years ago
- go to https://github.com/bruh-boys/reddit-automata its more complete than this repository☆10Jul 9, 2021Updated 4 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Jul 1, 2021Updated 4 years ago
- Learning notes of amazing Sliver C2 project.☆25Apr 14, 2023Updated 3 years ago
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- ☆12Jun 10, 2022Updated 3 years ago
- ☆11Aug 27, 2020Updated 5 years ago
- Library for writing external game cheats for Windows, written in C++.☆14Sep 5, 2016Updated 9 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆20Mar 4, 2022Updated 4 years ago
- A javascript based botnet/C&C to remotely manage/control browsers.☆23Feb 4, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Go tool to obfuscate and deobfuscate the code and file.☆13May 29, 2022Updated 3 years ago
- Injects shellcode into remote processes using direct syscalls☆76Dec 30, 2020Updated 5 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 4 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆13May 18, 2021Updated 4 years ago
- Steals telegram session(without any notifications) and google chrome credentials. Sending via telegram bot. Definitely works in 2020 with…☆15Sep 17, 2022Updated 3 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆29Aug 4, 2021Updated 4 years ago
- Find hidden directories from domain and subdomain.☆11Mar 27, 2022Updated 4 years ago