C2 infrastructure over Microsoft Teams.
.NET-based C2 framework with a collaborative web interface. Uses .NET Grunts as implants, supports a rich task library, and integrates with …
Covenant is a collaborative .NET C2 framework for red teamers.
cracke-dit ("Cracked It") makes it easier to perform regular password audits against Active Directory environments.
Swiss army knife for pentesting Windows/Active Directory environments. Tests credentials at scale, executes commands, dumps credentials, and…
Homemade Aggressor scripts kit for Cobalt Strike
CVE-2023-22515: Confluence Broken Access Control Exploit
Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included
Demonized Shell is an Advanced Tool for persistence in linux.
DarkFlare Firewall Piercing (TCP over CDN)
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM…
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
DeimosC2 is a Golang command and control framework for post-exploitation.
Free Goethe-Zertifikat study materials for all CEFR levels (A1–C2) — vocabulary, grammar, reading, listening, speaking, writing, and mock ex…
Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.
Weaponize DLL hijacking easily. Backdoor any function in any DLL.
Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports
Directory Services Internals (DSInternals) PowerShell Module and Framework
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 and v3 Notes
Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport
Relational database brute force and post exploitation tool for MySQL and MSSQL