-
Updated
Aug 14, 2020 - Go
#
c2
Here are 71 public repositories matching this topic...
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
frosty1313
commented
Mar 18, 2020
Empire Version
- Empire 3.x
OS Information (Linux flavor, Python version)
- OS: N/A
- Python: N/A
Describe the bug
All four RESTful API end points listed at https://github.com/BC-SECURITY/Empire/wiki/RESTful-API#admin-functionality have incorrect handlers. The handler should be: GET /api/admin/[endpoint].
To Reproduce
Steps to reproduce the behavior:
- Go to htt
Implant framework
golang
http
dns-server
red-team
security-tools
c2
red-team-engagement
command-and-control
implant
red-teaming
-
Updated
Aug 16, 2020 - Go
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
rat
malware-analysis
c2
command-and-control
remote-access-tool
remote-administration-tool
command-control
rat-analysis
rat-malware
-
Updated
Feb 17, 2020
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
-
Updated
Aug 17, 2020 - PowerShell
A Golang implant that uses Slack as a command and control server
python
golang
penetration-testing
pentest
red-team
remote-admin-tool
c2
command-and-control
penetration-testing-tools
-
Updated
Oct 10, 2019 - Python
-
Updated
May 17, 2020 - Go
Open source pre-operation C2 server based on python and powershell
-
Updated
Aug 14, 2020 - Python
Starkiller is a Frontend for PowerShell Empire.
-
Updated
Aug 10, 2020 - Vue
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
osint
anti-virus
password
owasp
vulnerability
recon
post-exploitation
burp
pentest
payload
privilege-escalation
iot-security
kali
cobalt-strike
social-engineering-attacks
metasploit
data-exfiltration
c2
wifi-hacking
threat-hunt
-
Updated
Dec 23, 2019
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
security
powershell
python3
cybersecurity
post-exploitation
offensive-security
security-tools
c2
command-and-control
redteam
implant
purpleteam
readteaming
-
Updated
Jun 30, 2020 - Python
Responsive Command and Control System
-
Updated
Jul 28, 2020 - HTML
Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW)
-
Updated
Aug 12, 2020 - JavaScript
Cyberdelia, a Collection of Command and Control frameworks
-
Updated
Oct 16, 2019 - Shell
Check Domain Fronting (chkdfront) - It checks if your domain fronting is working
-
Updated
Apr 3, 2019 - Ruby
AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
python
encoding
obfuscation
encryption
hacking
penetration-testing
rat
pentesting
reverseshell
oscp
c2
command-and-control
oscp-tools
-
Updated
Jun 7, 2020 - Python
Some notes and examples for cobalt strike's functionality
-
Updated
Jun 12, 2020
A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
-
Updated
Jun 24, 2020 - PowerShell
Discord C2 for Redteam....Need a better name
-
Updated
May 21, 2020 - Go
PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
-
Updated
May 9, 2019 - Python
Cross-platform C2 with modules for TCP, web, and more soon to come
python
docker
golang
flask
sqlalchemy
docker-compose
postgresql
c2
command-and-control
redteam
land-before-time
-
Updated
Oct 24, 2019 - Python
Improve this page
Add a description, image, and links to the c2 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the c2 topic, visit your repo's landing page and select "manage topics."
Bug
Describe the feature request or bug
When i launch BypassUACGrunt command with a launcher (for example, BypassUACGrunt PowerShell), Covenant prints a error that you can see in the screeshot. This error it's with last github master branch. PowerShell launcher is generated.
Screenshots
![image](https://user-images.githubusercontent.com/2709307/85056566-b3a3e300-b19f-11ea-8