PetaQ: malware which is being developed in.Pupy: opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python.Metasploit Framework: computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.Trevor C2: legitimate website (browsable) that tunnels client/server communications for covert command execution.Sliver: general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS.Merlin: cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.Providing high stability and an easy-to-use user interface, Quasar is the perfect remote administration solution for you. QuasarRAT: fast and light-weight remote administration tool coded in C#.Prismatica: modular C2 Interface hooked into the Diagon Command and Control Toolkit.Powerhub: convenient post exploitation tool for PowerShell which aids a pentester in transferring data, in particular code which may get flagged by endpoint protection.PoshC2: proxy aware C2 framework written completely in PowerShell to aid penetration testers with red teaming, post-exploitation and lateral movement.Octopus: open source, pre-operation C2 server based on python which can control an Octopus powershell agent through HTTP/S.EvilOSX: An evil RAT (Remote Administration Tool) for macOS / OS X.NorthStarC2: open-source command and control framework developed for penetration testing and red teaming purposes.Ninja: Open source C2 server created by Purple Team to do stealthy computer and Active directoty enumeration without being detected by SIEM and AVs.Koadic (or COM Command & Control): is a Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire.HARS: HTTP/S Asynchronous Reverse Shell.FudgeC2: Powershell C2 platform designed to facilitate team collaboration and campaign timelining.Faction C2: C2 framework which use websockets based API that allows for interacting with agents and transports.Silent Trinity: post-exploitation agent powered by Python, IronPython, C#/.NET.NET tradecraft easier, and serve as a collaborative command and control platform for red teamers. NET command and control framework that aims to highlight the attack surface of. Empire: post-exploitation framework that includes a pure- PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent.Dali: image-based C2 channel which utilizes Imgur to host images and task agents.CHAOS: PoC that allow payloads generation and control remote operating systems.Caldera: built on the MITRE ATT&CK™ framework and an active research project at MITRE.C3: framework that extends other red team tooling, such as the commercial Cobalt Strike (CS) product via ExternalC2, which is supported at release.Baby Shark: basic C2 generic server written in Python and Flask.AsyncRat C#: Remote Access Tool designed to remotely monitor and control other computers through a secure encrypted connection. Apfell: cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.Maintained If you have contributions but can’t pull request, give me a shout at twitter. If you’d like to contribute to this list, simply open a PR with your additions. A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |