Visit Website

Python framework for building and utilizing interfaces to transfer data between frameworks, with a specific focus on serving as an extension to Command and Control frameworks. Currently, this is only intended as an implementation of Cobalt Strike's External C2 specification as described in this spec document, but is subject to change as the project matures. Credits Massive credit goes to xychix. This project would not have been possible at all without their valuable contributions. Basically this project is a rebuild and extension of Outflank's External C2 project. Architecture This project consists of the following main parts: Builder Skeletons Frameworks Transports Encoders Manager (not yet implemented). Builder The builder reads in a config file, and uses configured options to generate a build by replacing markers within skeletons. The builder can be used with build_files.py. A sample builder configuration is provided as sample_builder_config.config.sample. Skeletons skeletons are the different 'skeletons' of code that the builder will dynamically populate to generate a completely usable build. Skeletons contain markers that will be replaced with usable values.

FEATURES

ALTERNATIVES

An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.

Offensive security tool for reconnaissance and information gathering with a wide range of features and future roadmap.

Fast web spider written in Go

A comprehensive .NET post-exploitation library designed for advanced security testing.

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang for efficient and secure communication.

A C2 front flow control tool designed to evade detection by Blue Teams, AVs, and EDRs.

A unified repository for different Metasploit Framework payloads.

Inceptor is a template-driven framework for evading Anti-Virus and Endpoint Detection and Response solutions, allowing users to create custom evasion techniques and test their security controls.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved