Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for red team c2
c2
x
red-team
x
23 search results found
Sliver
⭐
7,152
Adversary Emulation Framework
Covenant
⭐
4,034
Covenant is a collaborative .NET C2 framework for red teamers.
Villain
⭐
3,376
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Black Hat Rust
⭐
2,662
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
Phpsploit
⭐
2,000
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Poshc2
⭐
1,714
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Shad0w
⭐
1,432
A post exploitation framework designed to operate covertly on heavily monitored environments
Deimosc2
⭐
926
DeimosC2 is a Golang command and control framework for post-exploitation.
Octopus
⭐
717
Open source pre-operation C2 server based on python and powershell
Cobalt Strike Cheatsheet
⭐
528
Some notes and examples for cobalt strike's functionality
Kubesploit
⭐
501
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
Slackor
⭐
452
A Golang implant that uses Slack as a command and control server
Alanframework
⭐
435
A C2 post-exploitation framework
Orcac2
⭐
423
OrcaC2是一款基于Websocket加密通信的多功能C&C框架,使用Golang实现。
Bounceback
⭐
382
↕️🤫 Stealth redirector for your red team operation security
Nimbo C2
⭐
255
Nimbo-C2 is yet another (simple and lightweight) C2 framework
Fudgec2
⭐
236
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Realm
⭐
221
Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
Sharpgmailc2
⭐
219
Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol
Redditc2
⭐
174
Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic look legit.
Eternalhushframework
⭐
167
EternalHush - new free advanced open-source c2 framework
Link
⭐
160
link is a command and control framework written in rust
Amnesiac
⭐
157
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Rec2
⭐
95
REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs written in Rust. 🦀
Sharpftpc2
⭐
79
A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.
Httpworker
⭐
74
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
Awesome Cyber
⭐
65
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
Discordgo
⭐
59
Discord C2 for Redteam....Need a better name
Hades C2
⭐
55
Hades Basic Command & Control Server
Duckduckc2
⭐
55
A proof-of-concept C2 channel through DuckDuckGo's image proxy service
Gomalleable
⭐
47
🔎🪲 Malleable C2 profiles parser and assembler written in golang
Gorsh
⭐
44
A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Gopher47
⭐
41
A third-party Gopher Assassin for the Havoc Framework.
Trelloc2
⭐
38
Simple C2 over the Trello API
Monarch
⭐
36
Monarch - The Adversary Emulation Toolkit
Trelloc2
⭐
35
Simple C2 over the Trello API
Bifrost
⭐
34
A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.
C2pe
⭐
34
C2 and Post Exploitation Code
Sukoshi
⭐
28
Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.
Bifrost
⭐
21
Bifrost C2. Open-source post-exploitation using Discord API
Thunderstorm
⭐
20
Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)
Meteor
⭐
17
A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Redbloodc2
⭐
15
Palinka_c2
⭐
14
Just another useless C2 occupying space in some HDD somewhere.
Mavoc
⭐
12
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
Coyote
⭐
11
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements.
Red Team Tools
⭐
11
Repo containing cracked red teaming tools.
C2 Cloud
⭐
10
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
Explorationc2
⭐
10
Exploration around command and control (C2) and related subjects.
Mesa
⭐
10
Command and Control that uses NTP as the transport protocol.
Havocnotion
⭐
10
A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel.
Restless
⭐
10
A light in-memory implant in C# that bypasses Windows Firewall and Defender.
Br4vo6ix
⭐
9
C2 + Implant with protobuf based communication with focus on being quiet.
Gh0stbust3rz
⭐
8
Build a C2 system while becoming a techie Gh0stbust3r! Learn real-world RedTeam skills and even earn a basic c2 by completing the game
Http C2
⭐
7
A simple Command & Control Server that communicates over HTTP and API endpoints
Hermit
⭐
5
A post-exploitation, command and control framework written in Rust.
Titanii
⭐
5
C2 Server for pentesting, exploitation, and payload creation
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Badbird C2
⭐
5
Command and Control through the canarytokens.org platform
Related Searches
Penetration Testing Red Team (266)
Python Red Team (177)
1-23 of 23 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.