c2
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable C2 profiles that you may use. These profiles work with Coba…
RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.
An open-source remote desktop application designed for self-hosting, as an alternative to TeamViewer.
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
Cobalt Strike random C2 Profile 修改版(适配腾讯云函数,亚马逊云函数和CrossC2自定义protocol)
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
cobaltstrike ms17-010 module and some other
Cobalt Strike Malleable C2 Design and Reference Guide
Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)
Cobalt Strike Aggressor 插件包
Tools and Techniques for Red Team / Penetration Testing
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Impacket is a collection of Python classes for working with network protocols.
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.