BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-21.28%)
Mutual labels: post-exploitation, c2, command-and-control
MerlinMerlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+7393.62%)
Mutual labels: post-exploitation, c2, command-and-control
transportc2PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-53.19%)
Mutual labels: c2, command-and-control
ToRat clientThis is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (-38.3%)
Mutual labels: post-exploitation, command-and-control
meteorA cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-34.04%)
Mutual labels: c2, command-and-control
dark-lord-obamaAV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
Stars: ✭ 61 (+29.79%)
Mutual labels: c2, command-and-control
AlanFrameworkA C2 post-exploitation framework
Stars: ✭ 405 (+761.7%)
Mutual labels: post-exploitation, c2
disctopia-c2Windows Remote Administration Tool that uses Discord as C2
Stars: ✭ 216 (+359.57%)
Mutual labels: c2, command-and-control
chkdfrontCheck Domain Fronting (chkdfront) - It checks if your domain fronting is working
Stars: ✭ 42 (-10.64%)
Mutual labels: c2, command-and-control
linklink is a command and control framework written in rust
Stars: ✭ 345 (+634.04%)
Mutual labels: c2, command-and-control
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+1178.72%)
Mutual labels: post-exploitation
c2A simple, extensible C&C beaconing system.
Stars: ✭ 93 (+97.87%)
Mutual labels: command-and-control
nekrosNekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive KEY
Stars: ✭ 84 (+78.72%)
Mutual labels: command-and-control
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+4014.89%)
Mutual labels: post-exploitation
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+497.87%)
Mutual labels: command-and-control
XENAXENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (+170.21%)
Mutual labels: post-exploitation
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-72.34%)
Mutual labels: post-exploitation
OrionServerAn open-source, centralized HTTPS botnet
Stars: ✭ 58 (+23.4%)
Mutual labels: command-and-control
sudo sniffSteal user's password when running sudo for post-exploitation purposes
Stars: ✭ 26 (-44.68%)
Mutual labels: post-exploitation
AIX-for-Penetration-TestersA basic AIX enumeration guide for penetration testers/red teamers
Stars: ✭ 31 (-34.04%)
Mutual labels: post-exploitation