command-and-control
There are 234 repositories under command-and-control topic.
BishopFox/sliver
Adversary Emulation Framework
Ne0nd0g/merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Threekiii/Awesome-Redteam
一个攻防知识库。A knowledge base for red teaming and offensive security.
firehol/blocklist-ipsets
ipsets dynamically updated with firehol's update-ipsets.sh script
nil0x42/phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
alphaSeclab/awesome-rat
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
cyberark/kubesploit
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
loseys/BlackMamba
C2/post-exploitation framework
lu4p/ToRat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
sensepost/godoh
🕳 godoh - A DNS-over-HTTPS C2
cxnturi0n/convoC2
C2 infrastructure over Microsoft Teams.
3ct0s/dystopia-c2
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
looCiprian/GC2-sheet
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
Tomiwa-Ot/moukthar
Android remote administration tool
postrequest/link
link is a command and control framework written in rust
Coalfire-Research/Slackor
A Golang implant that uses Slack as a command and control server
Leo4j/Amnesiac
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
itaymigdal/Nimbo-C2
Nimbo-C2 is yet another (simple and lightweight) C2 framework
SitinCloud/Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).
activecm/rita
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
daanzu/kaldi-active-grammar
Python Kaldi speech recognition with grammars that can be set active/inactive dynamically at decode-time
d4rckh/grc2
grim reaper c2
pumpbin/pumpbin
🎃 PumpBin is an Implant Generation Platform.
not-sekiun/PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
PhoenixC2/PhoenixC2
Command & Control-Framework created for collaboration in python3
KCarretto/paragon
Red Team engagement platform with the goal of unifying offensive tools behind a simple UI
Ziconius/FudgeC2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
WangYihang/Reverse-Shell-Manager
:hammer: A multiple reverse shell session/client manager via terminal
Gr1mmie/AtlasC2
C# C2 Framework centered around Stage 1 operations
Ixve/Red-Team-Tools
Repo containing cracked red teaming tools.
alexfrancow/badusb_botnet
:busts_in_silhouette::smiling_imp: Infect a pc with badusb and establish a connection through telegram.
Raffy27/OrionPanel
An open-source, centralized HTTPS botnet
safesploit/PythonRAT
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
PushpenderIndia/nekros
NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive KEY
KCarretto/Arsenal
Extensible Red Team Framework
yuziiiiiiiiii/ThreatBook-C2
利用微步社区做天然白名单且免杀的远控C2(支持手机电脑)