C2

Explore 52 curated cybersecurity tools, with 15,161 visitors searching for solutions

Cobalt Strike Malleable C2 Design and Reference Guide Logo

A comprehensive guide for customizing Cobalt Strike's C2 profiles to enhance stealth and operational security.

0
Shadow Workers Logo

Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.

0
SourcePoint Logo

SourcePoint generates customizable C2 profiles for Cobalt Strike servers to enhance evasion capabilities against security defenses.

0
NimPlant Logo

A lightweight Command and Control (C2) implant written in Nim that provides remote access capabilities for penetration testing and red team operations.

0
WebDAV Covert Channel Logo

A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.

0
Koadic Logo

A COM Command & Control framework that uses JScript to provide fileless remote access capabilities on Windows systems through a modular plugin architecture.

0
Havoc Logo

Havoc is a malleable post-exploitation command and control framework that provides a client-server architecture with payload generation, customizable C2 profiles, and team collaboration capabilities for red team operations.

0
Kubesploit Logo

A cross-platform post-exploitation HTTP/2 Command & Control framework designed specifically for testing and exploiting containerized environments including Docker and Kubernetes.

0
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite Logo

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

0
SharpC2 Logo

SharpC2 is a C#-based Command and Control framework that provides remote access capabilities for penetration testing and red team operations.

0
Covenant Logo

Covenant is a collaborative .NET command and control framework designed for red team operations and offensive security engagements.

0
Fenrir Simple Bash IOC Scanner Logo

A lightweight bash script IOC scanner for Linux/Unix/macOS systems that detects malicious indicators through hash matching, filename analysis, string searches, and C2 server identification without requiring installation.

0
C2concealer Logo

A command line tool that generates randomized malleable C2 profiles for Cobalt Strike to vary command and control communication patterns.

0
CobaltBus Logo

CobaltBus integrates Cobalt Strike with Azure Service Bus to create covert C2 communication channels for red team operations.

0
MITRE Caldera™ Logo

MITRE Caldera™ is an automated adversary emulation platform built on the MITRE ATT&CK framework that supports red team operations and incident response activities through a modular C2 server and plugin architecture.

0
Domain Hunter Logo

A reconnaissance tool that analyzes expired domains for categorization, reputation, and Archive.org history to identify candidates suitable for phishing and C2 operations.

0
RedGuard Logo

RedGuard is a C2 front flow control tool that helps evade detection by security systems through traffic filtering and redirection capabilities.

0
RedWarden Logo

RedWarden is a Cobalt Strike C2 reverse proxy that uses packet inspection and malleable profile correlation to evade detection by security controls during red team operations.

0
SILENTTRINITY Logo

SILENTTRINITY is a Python-based, asynchronous C2 framework that uses .NET scripting languages for post-exploitation activities without relying on PowerShell.

0
SharpShooter Logo

A payload creation framework for generating and executing C# code payloads with anti-evasion capabilities for offensive security operations.

0
Pupy Logo

Pupy is an open-source, cross-platform C2 framework that provides remote access and control capabilities for compromised systems across Windows, Linux, OSX, and Android platforms.

0
Hale Logo

Hale is a modular botnet command and control monitoring tool that tracks C&C server communications across multiple protocols with web-based analysis interface and collaborative research capabilities.

0
AzureC2Relay Logo

An Azure Function that validates and relays Cobalt Strike beacon traffic based on Malleable C2 profile authentication.

0
GHH - Google Hack Honeypot Logo

GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

0