FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK
☆16Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for poshc2
Users that are interested in poshc2 are comparing it to the libraries listed below
Sorting:
- A Simple Script For SSH BruteForce☆38Aug 4, 2023Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Dec 19, 2023Updated 2 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- GUI based tool to track location and more info of mobile numbers☆82Nov 14, 2023Updated 2 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Aug 4, 2023Updated 2 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- This is a python script which automatically generates metepreter tcp or https shellcode encodes it and slaps some Behavioural detection i…☆14Feb 13, 2023Updated 3 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Sep 17, 2025Updated 5 months ago
- I present to you AsyncRAT improved version with a STUB which does not bug and which is undetectable via windows defender normally. I invi…☆16Sep 13, 2022Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆39Nov 28, 2023Updated 2 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆20Oct 9, 2021Updated 4 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- SorillusRAT 6.1 - A Java RAT with many features! [CRACKED]☆24Jun 9, 2023Updated 2 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆25Aug 4, 2023Updated 2 years ago
- A Crystal Palace shared library to resolve & perform syscalls☆56Oct 29, 2025Updated 4 months ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆45Jul 9, 2025Updated 7 months ago
- A simple script to obfuscate batch(bat) code easily☆25Oct 21, 2023Updated 2 years ago
- Anubis 7.0☆27Sep 28, 2024Updated last year
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆66Dec 11, 2023Updated 2 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆28Nov 21, 2022Updated 3 years ago
- My notes/solutions to the problems in "The Web Application Hacker's Handbook" (https://portswigger.net/web-security/web-application-hacke…☆28Jan 22, 2024Updated 2 years ago
- A daemonized DDexec.☆30Mar 22, 2025Updated 11 months ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆35Dec 2, 2021Updated 4 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆79Oct 21, 2023Updated 2 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 5 months ago
- Ddos с расширенными настройками. Проверка сразу несколько IP, два режима и атака на определенные порты. / Ddos with advanced settings. C…☆11Jun 7, 2020Updated 5 years ago
- A small script to find the exact Geo-location of IP☆38Nov 21, 2022Updated 3 years ago
- 「🛡️」AVs/EDRs Evasion tool☆103Dec 7, 2024Updated last year