Trending repositories for topic command-and-control
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
ipsets dynamically updated with firehol's update-ipsets.sh script
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Mi...
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Mi...
ipsets dynamically updated with firehol's update-ipsets.sh script
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
ipsets dynamically updated with firehol's update-ipsets.sh script
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Mi...
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷
IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Mi...
ipsets dynamically updated with firehol's update-ipsets.sh script
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Youtube as C2 - Control Windows systems uploading videos to Youtube
Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷
Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Supports OU filtering and removes disabled hosts.
Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control (C&C) servers.
ipsets dynamically updated with firehol's update-ipsets.sh script
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Mi...
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Youtube as C2 - Control Windows systems uploading videos to Youtube
Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷
Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control (C&C) servers.
IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
:busts_in_silhouette::smiling_imp: Infect a pc with badusb and establish a connection through telegram.
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Command & Control-Framework created for collaboration in python3
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Mi...
ipsets dynamically updated with firehol's update-ipsets.sh script
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).