teserakt-io / c2Links
E4's C2 server
☆20Updated 5 years ago
Alternatives and similar repositories for c2
Users that are interested in c2 are comparing it to the libraries listed below
Sorting:
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆131Updated last year
- DNS server for pentesters☆50Updated 2 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- ☆33Updated 5 years ago
- Collect autorun records from running system☆59Updated 4 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆108Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- suspect is a simple bash triage tool☆19Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Rosie the Pivoter☆17Updated 7 years ago
- Provides access to libhashcat☆31Updated last year
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- RACF Database Parser☆11Updated last year
- Shellcode library as a Go package☆70Updated 6 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Raw socket library/framework for red team events☆33Updated 2 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 8 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Network Finger Printer☆16Updated 8 years ago
- A tool suite for use during system assessments.☆35Updated 8 months ago
- Apfell Golang macOS/Linux/Windows implant☆90Updated 4 years ago
- Generic ASN.1 decoder/encoder to a structured text syntax☆50Updated 4 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 5 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Encode binary as English text over HTTP(s)☆30Updated 2 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Updated 2 weeks ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated last year
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago