AzureC2Relay
AzureC2Relay enhances security by validating and relaying Cobalt Strike beacon traffic through Azure Functions.
Full-featured C2 framework which silently persists on webserver via polymorphic PHP oneliner. The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor: <?php @eval($_SERVER['HTTP_PHPSPL01T']); ?> Efficient: More than 20 plugins to automate privilege-escalation tasks. Run commands and browse filesystem, bypassing PHP security restrictions. Upload/Download files between client and target. Edit remote files through local text editor. Run SQL console on target system. Spawn reverse TCP shells. Stealth: The framework is made by paranoids, for paranoids. Nearly invisible by log analysis and NIDS signature detection. Safe-mode and common PHP security restrictions bypass. Communications are hidden in HTTP Headers. Loaded payloads are obfuscated to bypass NIDS. http/https/socks4/socks5 Proxy support. Convenient: A robust interface with many crucial features. Detailed help for any optio
AzureC2Relay enhances security by validating and relaying Cobalt Strike beacon traffic through Azure Functions.
Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.
A tool for iOS pentesting and research with a GUI version available.
An exploitation framework for industrial security with modules for controlling PLCs and scanning devices.
SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.
A simple SSRF-testing sheriff written in Go