An open API service indexing awesome lists of open source software.

https://github.com/threadlinee/redteamc2

working in progress
https://github.com/threadlinee/redteamc2

Last synced: 7 months ago
JSON representation

working in progress

Awesome Lists containing this project

README

          

# RedTeamC2

## ✅ Tech Stack Summary

| Component | Description |
|------------------|------------------------------------------------------------------|
| **C# Agent** | Lightweight, stealthy implant for Windows |
| **Python Server**| Flask + SocketIO for real-time tasking and agent handling |
| **Encryption** | TLS + AES (custom protocol on top of HTTPS) |
| **SOCKS Proxy** | Pivot via infected host to reach internal targets |
| **File/Command** | Upload/download files, execute commands, capture screenshots |
| **Web UI** | Command center to monitor, control, and manage agents |
| **Staging** | Delivers DLLs or shellcode over HTTPS, injects in-memory |

---

## 🧠 Future Add-Ons (Advanced Ideas)
- **OPSEC mode:** Random jitter, HTTP user-agent rotation, domain fronting
- **EDR bypass:** AMSI bypass, inline PowerShell injection
- **Cross-platform support:** Add Python/Linux and macOS stagers
- **Transport Modules:** Add DNS, HTTP2, or custom TCP beaconing transports
- **Integration:** Export sessions to BloodHound or Covenant format

---

## 1. Red Team Command & Control (C2) Framework

**Languages:** C# (Implant/Agent) + Python (Server)

### Why?
Custom C2 frameworks give red teams flexibility over traditional tools like Cobalt Strike.

### Features
- Encrypted communication (TLS + AES)
- File upload/download, shell execution, screenshot capture
- SOCKS proxying (for pivoting)
- Built-in staging (DLL or shellcode delivery)
- Web UI (Flask or Blazor)

**✅ Pro:** Learn OPSEC, evasion, persistence

**💡 Use:**
- `System.Management.Automation`, `System.Net.Http` (C#)
- Python's `cryptography`, `Flask-SocketIO`