COLLECTED BY
Organization:
Internet Archive
Focused crawls are collections of frequently-updated webcrawl data from narrow (as opposed to broad or wide) web crawls, often focused on a single domain or subdomain.
The Wayback Machine - https://web.archive.org/web/20200826063944/https://github.com/topics/c2
Here are
72 public repositories
matching this topic...
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Covenant is a collaborative .NET C2 framework for red teamers.
Full-featured C2 framework which silently persists on webserver via evil PHP oneliner 😈
Updated
Aug 23, 2020
Python
A post exploitation framework designed to operate covertly on heavily monitored environments
the c2 programming language
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Updated
Aug 24, 2020
PowerShell
A Golang implant that uses Slack as a command and control server
Updated
Oct 10, 2019
Python
🕳 godoh - A DNS-over-HTTPS C2
Open source pre-operation C2 server based on python and powershell
Updated
Aug 19, 2020
Python
Starkiller is a Frontend for PowerShell Empire.
DeimosC2 is a Golang command and control framework for post-exploitation.
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Updated
Jun 30, 2020
Python
Responsive Command and Control System
Updated
Jul 28, 2020
HTML
Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
Updated
Aug 12, 2020
JavaScript
Cyberdelia, a Collection of Command and Control frameworks
Updated
Oct 16, 2019
Shell
Check Domain Fronting (chkdfront) - It checks if your domain fronting is working
AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
Updated
Jun 7, 2020
Python
Command and Control server on Slack
Updated
Jan 30, 2019
Python
Some notes and examples for cobalt strike's functionality
Simple C2 over the Trello API
Updated
Dec 31, 2019
Python
A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Updated
Jun 24, 2020
PowerShell
Discord C2 for Redteam....Need a better name
PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Updated
May 9, 2019
Python
a collection of code snippets and examples
Improve this page
Add a description, image, and links to the
c2
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
c2
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
Empire Version
OS Information (Linux flavor, Python version)
Describe the bug
All four RESTful API end points listed at https://github.com/BC-SECURITY/Empire/wiki/RESTful-API#admin-functionality have incorrect handlers. The handler should be: GET /api/admin/[endpoint].
To Reproduce
Steps to reproduce the behavior: