C2
Useful C2 techniques and cheat sheets learned from engagements
Empire is a PowerShell and Python post-exploitation agent.
Cobalt Strike HTTPS beaconing over Microsoft Graph API
渗透测试C2、支持Lua插件扩展、域前置/CDN上线、自定义profile、前置sRDI、文件管理、进程管理、内存加载、截图、反向代理、分组管理
Nameless C2 - A C2 with all its components written in Rust
🔥 CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.
✨Spark is a web-based, cross-platform and full-featured Remote Administration Tool (RAT) written in Go that allows you control all your devices anywhere. Spark是一个Go编写的,网页UI、跨平台以及多功能的远程控制和监控工具,你可以随时…
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
End-to-end Encrypted DNS Tunnelling and C2 framework
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles
For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.
A complete web-based remote monitoring and management web site. Once setup you can install agents and perform remote desktop session to devices on the local network or over the Internet.
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts
Mythic C2 agent targeting Linux and Windows hosts written in Rust
使用 rust 实现 CobaltStrike 的 beacon || Using Rust to implement CobaltStrike's Beacon