Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram
☆68Oct 31, 2021Updated 4 years ago
Alternatives and similar repositories for covert-control
Users that are interested in covert-control are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆105Dec 28, 2023Updated 2 years ago
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 11 months ago
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- Repository to gather the .NET malware I will be developing☆17Mar 7, 2026Updated last month
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PickleC2 is a post-exploitation and lateral movements framework☆97Jul 26, 2021Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Sep 15, 2022Updated 3 years ago
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆640Mar 28, 2025Updated last year
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆14May 1, 2020Updated 5 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆100Jun 24, 2024Updated last year
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆166Apr 22, 2022Updated 3 years ago
- ☆93Aug 23, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Mar 30, 2022Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Windows active user credential phishing tool☆284Mar 10, 2020Updated 6 years ago
- SAM Dumping in C#☆56Nov 27, 2025Updated 4 months ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆205Apr 2, 2026Updated 2 weeks ago
- Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.☆131Nov 25, 2021Updated 4 years ago
- ☆71Nov 19, 2021Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- Application Hijack Scanner for macOS☆71Sep 28, 2021Updated 4 years ago