The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy …


The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy …
GATOR – GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments. …
Commander is a command and control framework (C2) written in Python, Flask and SQLite. It comes with two agents written in …
While DLL sideloading can be used for legitimate purposes, such as loading necessary libraries for a program to function, it …
Wanderer is an open-source program that collects information about running processes. This information includes the integrity level, the presence of …
Acheron is a library inspired by SysWhisper3/FreshyCalls/RecycledGate, with most of the functionality implemented in Go assembly. acheron package can be …
Traditional obfuscation techniques tend to add layers to encapsulate standing code, such as base64 or compression. These payloads do continue …
An advanced, yet simple, tunneling tool that uses a TUN interface. by TNP IT Security Introduction Ligolo-ng is a simple, …
I created an Offensive Security Exam Report Template in Markdown so LaTeX, Microsoft Office Word, LibreOffice Writer are no longer …
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial …