Awesome Open Source
Awesome Open Source


Commit Activity Code Quality Licence Stars

FudgeC2 is a Powershell C2 platform designed to facilitate team collaboration and campaign timelining, released at BlackHat Arsenal USA 2019. This aims to help clients better understand red team activities by presenting them with more granular detail of adversarial techniques.

Built on Python3 with a web frontend, FudgeC2 aims to provide red team operators a simple interface in which to manage active implants across their campaigns.

FudgeC2 is in active development, and is receiving regular updates - if you have feature suggestions reach out with your ideas and suggestions.


To install and configure FudgeC2 run the following:

git clone
cd FudgeC2/FudgeC2
sudo pip3 install -r requirements.txt
sudo python3

This will generate the F2 database, and first time credentials. You will then be able to access the platform from http[s]:// The logon credentials are:


For more information on installation and configuration see the wiki, here.

Implant Functionality and Usage

FudgeC2 breaks projects down into campaigns. Each campaign will have their own implant templates, active implants, users, and targets.

To start you simply need to generate a new campaign, create an implant template with the campaign, and trigger one of the stagers on a target computer.


F2 implants contain a variety of builtin commands, which are also easily extended upon allowing operators the chance to create their own builtin functionality. An overview of functionality can be seen below, for more information on the builtin implant functionality or how to create custom modules see FudgeC2s' wiki, found here.

Implant functionality

Command Info
<command> If no builtin prefix in used the submitted value will be directly executed by Powershell.
:: sys_info Collects username, hostname, domain, and local IP
:: enable_persistence Enables persistence by embedding a stager payload into the following autorun registry key
:: export_clipboard Attempts to collect any text data stored in the users clipboard.
:: load_module [target script] This will load external powershell modules, such as JAWS.
:: exec_module [loaded module name] Executes a specific function of a loaded module.
:: list_modules Lists all loaded modules by the implant.
:: download_file [target file] Downloads the target file to the FudgeC2 server
:: upload_file [local file] [remote path/filename] Uploads a file to the target path and specific filename
:: play_audio [audio file (WAV)] Plays a WAV audio file on the compromised host.
:: screenshot Takes a screenshot of the compromised hosts desktop.


All contributions, suggestions, and feature requests are welcome. Feel free to reach out over GitHub, or via Twitter with ideas, suggestions and questions.


The FudgeC2 project and all module are under the GNU General Public License v3.0 unless explicitly noted otherwise. You can find the full licence here

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
Python3 (33,113
Powershell (24,426
Security (8,738
Security Tools (1,683
Cybersecurity (1,409
Redteam (516
Offensive Security (171
Post Exploitation (136
Related Projects