Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for penetration testing c2
c2
x
penetration-testing
x
14 search results found
Villain
⭐
3,376
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Black Hat Rust
⭐
2,662
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
Octopus
⭐
705
Open source pre-operation C2 server based on python and powershell
Slackor
⭐
452
A Golang implant that uses Slack as a command and control server
Bounceback
⭐
382
↕️🤫 Stealth redirector for your red team operation security
Pyiris
⭐
308
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Nebula
⭐
291
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
Credphish
⭐
262
CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
Awesome Cyber Security
⭐
255
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Phoenixc2
⭐
247
Command & Control-Framework created for collaboration in python3
Redditc2
⭐
174
Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic look legit.
Link
⭐
160
link is a command and control framework written in rust
Amnesiac
⭐
157
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Prismatica
⭐
99
Responsive Command and Control System
Httpworker
⭐
74
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
Gomalleable
⭐
47
🔎🪲 Malleable C2 profiles parser and assembler written in golang
Trelloc2
⭐
39
Simple C2 over the Trello API
Condi Boatnet
⭐
35
Condi Boatnet Ver 1 (old killer)
Trelloc2
⭐
35
Simple C2 over the Trello API
C2pe
⭐
34
C2 and Post Exploitation Code
Dark Lord Obama
⭐
31
AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
Transportc2
⭐
22
PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Bifrost
⭐
21
Bifrost C2. Open-source post-exploitation using Discord API
Maliketh
⭐
17
🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python
Connect
⭐
14
Command and Control Framework
Mavoc
⭐
12
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
Red Team Tools
⭐
11
Repo containing cracked red teaming tools.
Coyote
⭐
11
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements.
C2 Cloud
⭐
10
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
Gh0stbust3rz
⭐
8
Build a C2 system while becoming a techie Gh0stbust3r! Learn real-world RedTeam skills and even earn a basic c2 by completing the game
Titanii
⭐
5
C2 Server for pentesting, exploitation, and payload creation
Badbird C2
⭐
5
Command and Control through the canarytokens.org platform
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Related Searches
Python Penetration Testing (1,380)
Security Penetration Testing (767)
Scanner Penetration Testing (373)
Penetration Testing Pentest Tool (347)
Exploitation Penetration Testing (339)
Penetration Testing Cybersecurity (287)
Penetration Testing Information Security (275)
Penetration Testing Red Team (266)
Penetration Testing Hacking Tool (253)
Golang Penetration Testing (199)
1-14 of 14 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.