There are 78 repositories under command-and-control topic.
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
一个攻防知识库。A knowledge base for red teaming and offensive security.
ipsets dynamically updated with firehol's update-ipsets.sh script
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
C2/post-exploitation framework
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
link is a command and control framework written in rust
A Golang implant that uses Slack as a command and control server
Nimbo-C2 is yet another (simple and lightweight) C2 framework
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Python Kaldi speech recognition with grammars that can be set active/inactive dynamically at decode-time
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Red Team engagement platform with the goal of unifying offensive tools behind a simple UI
The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
:hammer: A multiple reverse shell session/client manager via terminal
Repo containing cracked red teaming tools.
:busts_in_silhouette::smiling_imp: Infect a pc with badusb and establish a connection through telegram.
An open-source, centralized HTTPS botnet
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive KEY