Loading...
Browse 39 command and control tools
Preemptive threat intelligence platform for incident response and hunting
Preemptive threat intelligence platform for incident response and hunting
AI-powered platform identifying C2 and attack infrastructure pre-weaponization
AI-powered platform identifying C2 and attack infrastructure pre-weaponization
Cloud-native DNS filtering solution that blocks malicious domains and threats
Cloud-native DNS filtering solution that blocks malicious domains and threats
Encrypted network with isolated non-routable servers and obfuscation
Encrypted network with isolated non-routable servers and obfuscation
Network isolation for endpoints while maintaining command and control access
Network isolation for endpoints while maintaining command and control access
Managed DNS layer security monitoring service for threat detection and blocking
Managed DNS layer security monitoring service for threat detection and blocking
Platform for tracking adversary infrastructure and C2 communications
Platform for tracking adversary infrastructure and C2 communications
AI-powered network threat detection across hybrid environments
AI-powered network threat detection across hybrid environments
AI-driven threat detection platform identifying malicious behaviors across networks
AI-driven threat detection platform identifying malicious behaviors across networks
Enterprise threat intelligence feeds covering malware, phishing, C2, and IPs
Enterprise threat intelligence feeds covering malware, phishing, C2, and IPs
SaaS BAS platform automating C2 attacks with AI-driven remediation plans
SaaS BAS platform automating C2 attacks with AI-driven remediation plans
Real-time C2 infrastructure detection and disruption threat intelligence feed
Real-time C2 infrastructure detection and disruption threat intelligence feed
Proactive C2 threat intelligence feed for detecting adversary infrastructure
Proactive C2 threat intelligence feed for detecting adversary infrastructure
C3 is a framework by WithSecureLabs for rapid prototyping of custom command and control channels that integrates with existing offensive security toolkits.
C3 is a framework by WithSecureLabs for rapid prototyping of custom command and control channels that integrates with existing offensive security toolkits.
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
A Python framework for building custom Command and Control interfaces that implements Cobalt Strike's External C2 specification for data transfer between frameworks.
A Python framework for building custom Command and Control interfaces that implements Cobalt Strike's External C2 specification for data transfer between frameworks.
A cross-platform HTTP/2 Command & Control framework written in Golang for post-exploitation activities and remote system management.
A cross-platform HTTP/2 Command & Control framework written in Golang for post-exploitation activities and remote system management.
A comprehensive guide for customizing Cobalt Strike's C2 profiles to enhance stealth and operational security.
A comprehensive guide for customizing Cobalt Strike's C2 profiles to enhance stealth and operational security.
Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.
Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.
SourcePoint generates customizable C2 profiles for Cobalt Strike servers to enhance evasion capabilities against security defenses.
SourcePoint generates customizable C2 profiles for Cobalt Strike servers to enhance evasion capabilities against security defenses.
A lightweight Command and Control (C2) implant written in Nim that provides remote access capabilities for penetration testing and red team operations.
A lightweight Command and Control (C2) implant written in Nim that provides remote access capabilities for penetration testing and red team operations.
A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
A COM Command & Control framework that uses JScript to provide fileless remote access capabilities on Windows systems through a modular plugin architecture.
A COM Command & Control framework that uses JScript to provide fileless remote access capabilities on Windows systems through a modular plugin architecture.
Havoc is a malleable post-exploitation command and control framework that provides a client-server architecture with payload generation, customizable C2 profiles, and team collaboration capabilities for red team operations.
Havoc is a malleable post-exploitation command and control framework that provides a client-server architecture with payload generation, customizable C2 profiles, and team collaboration capabilities for red team operations.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance