teserakt-io / c2Links
E4's C2 server
☆20Updated 5 years ago
Alternatives and similar repositories for c2
Users that are interested in c2 are comparing it to the libraries listed below
Sorting:
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆124Updated 11 months ago
- DNS server for pentesters☆49Updated 3 years ago
- ☆33Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Shellcode library as a Go package☆70Updated 5 years ago
- RACF Database Parser☆11Updated last year
- Rosie the Pivoter☆17Updated 7 years ago
- WhiteBeam: Transparent endpoint security☆100Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 8 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 4 years ago
- ☆20Updated 6 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Shellcode process injector☆28Updated 5 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆104Updated 2 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Network Traffic Fuzzer☆18Updated 9 months ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Provides access to libhashcat☆31Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 2 years ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 4 years ago
- Shared library loading application for Linux written in Go.☆17Updated 5 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago