Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-command-control
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.
https://github.com/tcostam/awesome-command-control
Last synced: 2 days ago
JSON representation
-
Tools
-
Open Source
- Apfell - platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.
- AsyncRat C#
- Baby Shark
- C3
- Caldera
- CHAOS
- Dali - based C2 channel which utilizes Imgur to host images and task agents.
- FudgeC2
- Godoh
- Empire - exploitation framework that includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent
- Covenant
- Silent Trinity - exploitation agent powered by Python, IronPython, C#/.NET.
- Flying A False Flag
- iBombshell
- HARS
- MacShellSwift
- Ninja
- NorthStarC2 - source command and control framework developed for penetration testing and red teaming purposes.
- EvilOSX
- Nuages
- Octopus - operation C2 server based on python which can control an Octopus powershell agent through HTTP/S.
- PoshC2 - exploitation and lateral movement
- Powerhub
- QuasarRAT - weight remote administration tool coded in C#. Providing high stability and an easy-to-use user interface, Quasar is the perfect remote administration solution for you.
- Merlin - platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
- Sliver - platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS.
- SK8PARK/RAT
- Throwback
- Trevor C2
- Metasploit Framework
- Meterpreter
- Pupy - platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python.
- PetaQ
- Pinjectra - bit) in a "mix and match" style.
- ReverseTCPShell
- SHAD0W
- Gcat
- DNScat2 - and-control (C&C) channel over the DNS protocol.
- EggShell
- EvilVM
- Faction C2
- Koadic (or COM Command & Control) - exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire.
- Prismatica
- SharpC2
- Void-RAT
- C3
- EggShell
- iBombshell
- MacShellSwift
- Ninja
- Apfell - platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.
- Faction C2
- WEASEL - memory implant using Python 3 with no dependencies.
-
Commercial
- Voodoo
- Voodoo
- Innuendo
- Scythe
- Cobalt Strike
- Red Team Toolkit (or Slingshot)
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Red Team Toolkit (or Slingshot)
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Red Team Toolkit (or Slingshot)
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Red Team Toolkit (or Slingshot)
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
- Voodoo
-
-
Online Resources
-
Commercial
-
-
Articles
-
Videos
-
Commercial
-
Programming Languages
Categories
Sub Categories
Keywords
c2
9
post-exploitation
6
red-team
5
command-and-control
4
remote-admin-tool
4
golang
4
python
4
powershell
4
dotnet
4
reverse-shell
4
pentesting
4
rat
4
python3
4
redteam
3
security
3
backdoor
3
security-tools
3
http
2
remote
2
windows
2
meterpreter
2
c-sharp
2
dns
2
macos
2
payload
2
hacking
2
implant
2
remote-control
2
cybersecurity
2
dns-over-https
1
doh
1
empire
1
redteam-infrastructure
1
covenant
1
dotnet-core
1
boolang
1
dotnet-dlr
1
dotnet-script
1
admin
1
asynchronous
1
loader
1
socket
1
tcp
1
tool
1
adversary-emulation
1
caldera
1
mitre
1
mitre-attack
1
mitre-corporation
1
security-automation
1