reveng007 / C2_Server
C2 server to connect to a victim machine via reverse shell
☆48Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for C2_Server
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated last year
- Koadic C3 COM Command & Control - JScript RAT☆43Updated 7 years ago
- A C2 framework built for my bachelors thesis☆53Updated 3 weeks ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆25Updated last year
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆61Updated 9 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆119Updated 2 years ago
- Undetectable payload for Windows 10 and 11☆39Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆71Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆20Updated 2 years ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆235Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆51Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆103Updated 10 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆106Updated last year
- .NET Antivirus Evasion Tool (Exe2Bat)☆32Updated 2 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆32Updated 5 months ago
- Social Engineering Browser Update Attack.☆54Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆86Updated last year
- 「🛡️」AVs/EDRs Evasion tool☆91Updated 8 months ago
- ☆117Updated 8 months ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆89Updated last month
- Generate FUD backdoors☆239Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 2 years ago
- PowerJoker is a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.☆35Updated 7 months ago