Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Ignitetechnologies/Command-Control
This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploit remote session.
https://github.com/Ignitetechnologies/Command-Control
Last synced: 3 months ago
JSON representation
This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploit remote session.
- Host: GitHub
- URL: https://github.com/Ignitetechnologies/Command-Control
- Owner: Ignitetechnologies
- Created: 2019-10-06T14:52:22.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2020-11-07T19:16:31.000Z (almost 4 years ago)
- Last Synced: 2024-02-11T21:19:25.084Z (9 months ago)
- Homepage:
- Size: 4.88 KB
- Stars: 64
- Watchers: 6
- Forks: 19
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - Ignitetechnologies/Command-Control - This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploit remote session. (Others)
README
# Command & Control Cheatsheet
This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploit remote session. Clicking on the Name of the tool will direct you to a detailed guide to use that tool. Please share this with your connections. Direct queries and feedback to [Pavandeep Singh](https://twitter.com/pavan2318).
[1.1]: http://i.imgur.com/tXSoThF.png
[1]: http://www.twitter.com/hackinarticles
# Follow us on [![alt text][1.1]][1]|No.|Tool Name|
|-------|----------------|
|1.|[icmpsh](https://www.hackingarticles.in/command-and-control-tunnelling-via-icmp/)|
|2.|[Ares](https://www.hackingarticles.in/command-control-ares/)|
|3.|[WebDav C2](https://www.hackingarticles.in/command-control-webdav-c2/)|
|4.|[WebSocket C2](https://www.hackingarticles.in/command-control-websocketc2/)|
|5.|[DropboxC2](https://www.hackingarticles.in/command-and-control-with-dropboxc2/)|
|6.|[dnscat2](https://www.hackingarticles.in/dnscat2-command-and-control-over-the-dns/)|
|7.|[Silenttrinity](https://www.hackingarticles.in/command-control-silenttrinity-post-exploitation-agent/)|
|8.|[Pupy](https://www.hackingarticles.in/command-control-tool-pupy/)|
|9.|[Merlin](https://www.hackingarticles.in/command-and-control-guide-to-merlin/)|
|10.|[TrevorC2](https://www.hackingarticles.in/trevorc2-command-and-control/)|
|11.|[JSRat](https://www.hackingarticles.in/command-and-control-with-http-shell-using-jsrat/)|
|12.|[Koadic – COM](https://www.hackingarticles.in/koadic-com-command-control-framework/)|