Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for hacking tool c2
c2
x
hacking-tool
x
9 search results found
Villain
⭐
3,376
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Alanframework
⭐
435
A C2 post-exploitation framework
Sharpgmailc2
⭐
219
Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol
Drat
⭐
216
去中心化远程控制工具(Decentralized Remote Administration Tool),通过ENS实现了配置文件分发的去中心化,通过Telegram实现了服务端的去中心化
Eternalhushframework
⭐
167
EternalHush - new free advanced open-source c2 framework
Spyderc2
⭐
18
A simple, dockerized python based Command and Control(C2) Framework named SpyderC2
Mavoc
⭐
12
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
Fateh Framework
⭐
12
Fateh-Framework is a simple C2 (Command & Control) tool that attacking windows/Linux machines.
C2 Cloud
⭐
10
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Related Searches
Python Hacking Tool (458)
Penetration Testing Hacking Tool (253)
1-9 of 9 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.