Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram
☆69Oct 31, 2021Updated 4 years ago
Alternatives and similar repositories for covert-control
Users that are interested in covert-control are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Dec 28, 2023Updated 2 years ago
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 2 weeks ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆113Sep 15, 2022Updated 3 years ago
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆638Mar 28, 2025Updated 11 months ago
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆14May 1, 2020Updated 5 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆100Jun 24, 2024Updated last year
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆167Apr 22, 2022Updated 3 years ago
- ☆93Aug 23, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Mar 30, 2022Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Windows active user credential phishing tool☆283Mar 10, 2020Updated 6 years ago
- SAM Dumping in C#☆55Nov 27, 2025Updated 3 months ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆202Aug 1, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.☆131Nov 25, 2021Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- Application Hijack Scanner for macOS☆71Sep 28, 2021Updated 4 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago