Command And Control

Explore 29 curated cybersecurity tools, with 17,495+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
OPSWAT MetaDefender InSights C2 Logo

Real-time C2 infrastructure detection and disruption threat intelligence feed

0
InSights by Inquest Logo

InSights by InQuest is a threat intelligence platform that delivers curated feeds of IOCs and C2 information to help security teams detect and respond to emerging threats.

0
C3 Logo

C3 is a framework by WithSecureLabs for rapid prototyping of custom command and control channels that integrates with existing offensive security toolkits.

0
Brute Ratel C4 Logo

Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

0
Malware Patrol Logo

Malware Patrol offers a range of threat intelligence solutions, including enterprise data feeds, DNS firewall, phishing threat intelligence, and small business protection.

0
external_c2 framework Logo

A Python framework for building custom Command and Control interfaces that implements Cobalt Strike's External C2 specification for data transfer between frameworks.

0
Merlin Logo

A cross-platform HTTP/2 Command & Control framework written in Golang for post-exploitation activities and remote system management.

0
Cobalt Strike Malleable C2 Design and Reference Guide Logo

A comprehensive guide for customizing Cobalt Strike's C2 profiles to enhance stealth and operational security.

0
Shadow Workers Logo

Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.

0
SourcePoint Logo

SourcePoint generates customizable C2 profiles for Cobalt Strike servers to enhance evasion capabilities against security defenses.

0
NimPlant Logo

A lightweight Command and Control (C2) implant written in Nim that provides remote access capabilities for penetration testing and red team operations.

0
WebDAV Covert Channel Logo

A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.

0
Koadic Logo

A COM Command & Control framework that uses JScript to provide fileless remote access capabilities on Windows systems through a modular plugin architecture.

0
Havoc Logo

Havoc is a malleable post-exploitation command and control framework that provides a client-server architecture with payload generation, customizable C2 profiles, and team collaboration capabilities for red team operations.

0
Kubesploit Logo

A cross-platform post-exploitation HTTP/2 Command & Control framework designed specifically for testing and exploiting containerized environments including Docker and Kubernetes.

0
SharpC2 Logo

SharpC2 is a C#-based Command and Control framework that provides remote access capabilities for penetration testing and red team operations.

0
Covenant Logo

Covenant is a collaborative .NET command and control framework designed for red team operations and offensive security engagements.

0
C2concealer Logo

A command line tool that generates randomized malleable C2 profiles for Cobalt Strike to vary command and control communication patterns.

0
CobaltBus Logo

CobaltBus integrates Cobalt Strike with Azure Service Bus to create covert C2 communication channels for red team operations.

0
MITRE Caldera™ Logo

MITRE Caldera™ is an automated adversary emulation platform built on the MITRE ATT&CK framework that supports red team operations and incident response activities through a modular C2 server and plugin architecture.

0
RedGuard Logo

RedGuard is a C2 front flow control tool that helps evade detection by security systems through traffic filtering and redirection capabilities.

0
SILENTTRINITY Logo

SILENTTRINITY is a Python-based, asynchronous C2 framework that uses .NET scripting languages for post-exploitation activities without relying on PowerShell.

0
Pupy Logo

Pupy is an open-source, cross-platform C2 framework that provides remote access and control capabilities for compromised systems across Windows, Linux, OSX, and Android platforms.

0
Hale Logo

Hale is a modular botnet command and control monitoring tool that tracks C&C server communications across multiple protocols with web-based analysis interface and collaborative research capabilities.

0