cyb1l's repositories
AlanFramework
A C2 post-exploitation framework
Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
awesome-hacking-1
A curated list of awesome Hacking tutorials, tools and resources
c2compiler
the c2 programming language
C3
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
CVE-2023-38831
CVE-2023-38831 PoC (Proof Of Concept)
DeimosC2
DeimosC2 is a Golang command and control framework for post-exploitation.
donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
GodGenesis
A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
hibernateAndJpa
initial
mitm-1
👨🏼💻 A customizable man-in-the-middle TCP proxy.
Orcus-1.9.1-src
Full Orcus 1.9.1 Source Code
pixload
Image Payload Creating/Injecting tools
PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Prismatica
Responsive Command and Control System
proxify
Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
proxyee
HTTP proxy server,support HTTPS&websocket.MITM impl,intercept and tamper HTTPS traffic.
reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
shuttle
A web proxy in Golang with amazing features.
Spark
✨Spark is a web-based, cross-platform and full-featured Remote Administration Tool (RAT) written in Go that allows you control all your devices anywhere. Spark是一个Go编写的,网页UI、跨平台以及多功能的远程控制和监控工具,你可以随时随地监控和控制所有设备。
SuperLink
Social engineering tool for multiple purposes such as locating target's location, webcam access, OS Password grabber...
tools
Somes tools and scripts
VSTO-POC
A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously
warcprox
WARC writing MITM HTTP/S proxy
wazuh-kubernetes
Wazuh - Wazuh Kubernetes
windows-extension-exploit
Exploit for Windows extension, it can hide the .exe extension and replace it with any other extension