Script is a proof of concept how to control your machine by using social media sites.
☆23Feb 14, 2018Updated 8 years ago
Alternatives and similar repositories for Social-media-c2
Users that are interested in Social-media-c2 are comparing it to the libraries listed below
Sorting:
- Scripts related to offensiveosint.io☆23Jun 5, 2020Updated 5 years ago
- Detect firearm and nudity on Twitter and Instagram☆14Mar 27, 2019Updated 6 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆14Jan 24, 2022Updated 4 years ago
- Offensive OSINT☆33Sep 5, 2020Updated 5 years ago
- Pixel-perfect replica of Windows 10, simulated in the browser with Vanilla JS.☆17Dec 16, 2017Updated 8 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Botnet (Zombie Networks) with C# and Web Socket☆15Jul 8, 2014Updated 11 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- ☆10Jul 24, 2017Updated 8 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- A Simple C&C Server Written In Python☆35Nov 6, 2018Updated 7 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- All the tools you need to make your own mind up from the Open Data Sets☆141Oct 17, 2022Updated 3 years ago
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Mar 3, 2026Updated last week
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆46Feb 28, 2026Updated last week
- FROM BEGINNER TO ADVANCED FOR ALL SECURITY ENTHUSIASTS.☆18Mar 23, 2018Updated 7 years ago
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆15Sep 8, 2023Updated 2 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Jan 21, 2023Updated 3 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Guaranteed cracking of PDF files using RC4 40-bit encryption☆20Dec 9, 2012Updated 13 years ago
- Nothing interesting to see here. Old hack on the nfc-tools code, mirror of http://nfc-tools.googlecode.com/svn/trunk — see README.md for …☆52Jul 30, 2020Updated 5 years ago
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆311Dec 8, 2022Updated 3 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- Malware Dump☆21Dec 24, 2016Updated 9 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 6 months ago
- Get a clean, ready-to-go Linux box in seconds.☆25Mar 12, 2024Updated last year
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago