teserakt-io / c2Links
E4's C2 server
☆20Updated 5 years ago
Alternatives and similar repositories for c2
Users that are interested in c2 are comparing it to the libraries listed below
Sorting:
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆129Updated last year
- ☆33Updated 5 years ago
- Provides access to libhashcat☆31Updated last year
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Rosie the Pivoter☆17Updated 7 years ago
- DNS server for pentesters☆50Updated 3 weeks ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- Encode binary as English text over HTTP(s)☆30Updated 2 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- RACF Database Parser☆11Updated last year
- Network Finger Printer☆16Updated 8 years ago
- Gandcrab v5.2 decryption scripts☆16Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 4 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆101Updated last week
- ☆20Updated 6 years ago
- Shellcode process injector☆28Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Network Traffic Fuzzer☆18Updated 11 months ago
- Shellcode library as a Go package☆70Updated 6 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- pwntools for go!☆12Updated 6 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year