teserakt-io / c2Links
E4's C2 server
☆20Updated 4 years ago
Alternatives and similar repositories for c2
Users that are interested in c2 are comparing it to the libraries listed below
Sorting:
- ☆33Updated 4 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- DNS server for pentesters☆49Updated 3 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆123Updated 9 months ago
- Shared library loading application for Linux written in Go.☆16Updated 4 years ago
- Shellcode process injector☆28Updated 5 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Provides access to libhashcat☆30Updated last year
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- Shellcode library as a Go package☆70Updated 5 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- RACF Database Parser☆11Updated last year
- Network Finger Printer☆16Updated 7 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50Updated 3 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆100Updated 2 years ago
- ☆20Updated 6 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 6 years ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 4 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Collect autorun records from running system☆60Updated 3 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- various slides and presentations I've worked on☆19Updated 4 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 3 years ago