Golang C2 Client + PHP API Handler
☆13Aug 1, 2023Updated 2 years ago
Alternatives and similar repositories for panda-c2
Users that are interested in panda-c2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple C2 like Slovakia. Based on the Mirai(未来) cnc with ssh.☆12Jan 25, 2022Updated 4 years ago
- Moobot Botnet | Leaked version☆18Jan 11, 2021Updated 5 years ago
- Discord Panel is an AIO panel for Discord that aims to have all the needed tools related to user token interactions, as in nuking and als…☆13Sep 20, 2021Updated 4 years ago
- 2023hvv期间部分爆出漏洞的辅助扫描工具☆20Apr 24, 2025Updated 11 months ago
- ☆12Oct 12, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 一款基于fofa api语句的资产收集工具,用于红队快速收集顶级域名或者ip相关关联的资产☆27Jul 13, 2023Updated 2 years ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 2 months ago
- Everything related to YARA☆16Feb 19, 2026Updated last month
- Collection of exploits developed by your friendly clown☆14Oct 18, 2025Updated 5 months ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Mc backdoor plugin analized EDU☆13Dec 15, 2022Updated 3 years ago
- ☆14Sep 1, 2024Updated last year
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- A strong bot protection system for Flask with many features: rate limiting, special rules for users, web crawler detection, and automatic…☆21Feb 1, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 3 weeks ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆12Oct 27, 2024Updated last year
- Decentralized Device Orchestration Framework inspired by Mirai Architecture☆38Jan 24, 2026Updated 2 months ago
- Multiplayer Client☆16Dec 15, 2022Updated 3 years ago
- RISC-V V Extension Encoder☆11Jul 28, 2022Updated 3 years ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 5 months ago
- Xytharis - the GDI Trojan☆15Mar 12, 2022Updated 4 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- 用于内网渗透测试的工具包括 crto 认证、AD 渗透以及内网信息收集项目的自存☆18May 31, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- python to tax form compiler☆12Jun 6, 2022Updated 3 years ago
- Easy to use JAR to DLL converter☆24Dec 2, 2022Updated 3 years ago
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆19Aug 26, 2025Updated 7 months ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- ☆80Feb 4, 2026Updated last month
- Hession-Deserialize-RCE 反序列化命令执行☆24Dec 27, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Satori botnet variant☆13Mar 19, 2022Updated 4 years ago
- (SP)^3: A Simple, Practical, and Safe Packet Spoofing Protocol☆15Mar 13, 2017Updated 9 years ago
- Exploit for CVE-2022-27226☆15Mar 19, 2022Updated 4 years ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 7 years ago
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆14Oct 17, 2023Updated 2 years ago
- ☆12Mar 10, 2024Updated 2 years ago
- 基于爬虫式对FoFa数据进行爬取,无需FoFa高级会员和F币,未登录,普通用户,基础会员,高级会员均可使用。☆10Jan 15, 2022Updated 4 years ago