teserakt-io / c2Links
E4's C2 server
☆20Updated 5 years ago
Alternatives and similar repositories for c2
Users that are interested in c2 are comparing it to the libraries listed below
Sorting:
- Rosie the Pivoter☆17Updated 7 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆127Updated last year
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- DNS server for pentesters☆50Updated last week
- ☆33Updated 5 years ago
- Shellcode library as a Go package☆70Updated 6 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆101Updated this week
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Gandcrab v5.2 decryption scripts☆16Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 4 years ago
- Provides access to libhashcat☆31Updated last year
- suspect is a simple bash triage tool☆18Updated 7 years ago
- Encode binary as English text over HTTP(s)☆30Updated 2 years ago
- various slides and presentations I've worked on☆19Updated 7 months ago
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- RACF Database Parser☆11Updated last year
- ☆20Updated 6 years ago
- Network Finger Printer☆16Updated 8 years ago