-
Updated
Apr 13, 2022 - Go
#
c2
Here are 152 public repositories matching this topic...
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Covenant is a collaborative .NET C2 framework for red teamers.
-
Updated
Feb 26, 2022 - C#
Adversary Emulation Framework
dns
golang
http
gplv3
dns-server
sliver
red-team
security-tools
c2
red-team-engagement
command-and-control
implant
adversarial-attacks
red-teaming
adversary-simulation
-
Updated
May 30, 2022 - Go
nil0x42
commented
Oct 3, 2020
Current implementation of proclist plugin uses win32_ps_list_procs() php function on Windows host.
Therefore, linux implementation is a simple system("ps -a"), which is OPSEC unsafe, an would probably trigger EDR alerts.
A better implementation should avoid relying on system command execution.
to be documented
stealth
impacts stealthness and evasion capabilities
good first issue
issue is good for first-time contributors
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
rust
security
virus
scanner
phishing
wasm
hacking
audit
trojan
bug-bounty
infosec
pentesting
beacon
pentest
offensive-security
red-team
security-tools
c2
bug-hunting
shellcodes
-
Updated
May 24, 2022 - Rust
Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++ like CobaltStrike.
windows
macos
linux
golang
qt
backdoor
cross-platform
grpc
trojan
rat
macosx
post-exploitation
beacon
cobalt-strike
red-team
c2
redteam
cobaltstrike
-
Updated
Mar 11, 2022 - C++
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
-
Updated
May 18, 2022 - PowerShell
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
rat
malware-analysis
c2
command-and-control
remote-access-tool
remote-administration-tool
command-control
rat-analysis
rat-malware
-
Updated
Feb 17, 2020
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
agent
kubernetes
golang
security
containers
http2
post-exploitation
security-tools
c2
penetration-testing-framework
command-and-control
red-teams
penetration-testing-tools
redteam-tools
-
Updated
May 3, 2022 - Go
Starkiller is a Frontend for PowerShell Empire.
-
Updated
Mar 17, 2022 - Vue
DeimosC2 is a Golang command and control framework for post-exploitation.
-
Updated
May 23, 2022 - Vue
Open source pre-operation C2 server based on python and powershell
-
Updated
Jul 6, 2021 - Python
Some notes and examples for cobalt strike's functionality
-
Updated
Feb 8, 2022
-
Updated
Mar 1, 2022 - Go
A Golang implant that uses Slack as a command and control server
python
golang
penetration-testing
pentest
red-team
remote-admin-tool
c2
command-and-control
penetration-testing-tools
-
Updated
Apr 7, 2021 - Python
link is a command and control framework written in rust
-
Updated
Aug 18, 2021 - Rust
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
osint
anti-virus
password
owasp
vulnerability
recon
post-exploitation
burp
pentest
payload
privilege-escalation
iot-security
kali
cobalt-strike
social-engineering-attacks
metasploit
data-exfiltration
c2
wifi-hacking
threat-hunt
-
Updated
Dec 23, 2019
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
security
powershell
python3
cybersecurity
post-exploitation
offensive-security
security-tools
c2
command-and-control
redteam
implant
purpleteam
readteaming
-
Updated
May 7, 2022 - Python
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
-
Updated
Nov 2, 2021 - Python
CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
shell
dns
backdoor
reverse-shell
penetration-testing
dns-server
information-security
kali-linux
offensive-security
exfiltration
kali
bypass-antivirus
antivirus-evasion
c2
social-engineering
kali-scripts
amsi
-
Updated
Jul 27, 2021 - PowerShell
A C2 post-exploitation framework
-
Updated
May 20, 2022 - JavaScript
Windows Remote Administration Tool that uses Discord as C2
-
Updated
May 30, 2022 - Python
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive.
-
Updated
Nov 15, 2021 - Go
Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
-
Updated
Aug 12, 2020 - JavaScript
PowerShell Ransomware Simulator with C2 Server
-
Updated
Apr 6, 2022 - PowerShell
Improve this page
Add a description, image, and links to the c2 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the c2 topic, visit your repo's landing page and select "manage topics."


Note: Please fill out all sections (if applicable) and do not delete the below section headers, otherwise the bot will close the issue.
Empire Version
OS Information (Linux flavor, Python version)
Describe the bug
The 'remove stale agents' API does not work. Calling
(according to https://github.com/Empir