[go: up one dir, main page]

Showing 41 open source projects for "c2"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Searching for a better way to ship ecommerce? We can help Icon
    Searching for a better way to ship ecommerce? We can help

    ShipHero gives you the tools that give you ecommerce fulfillment super powers.

    ShipHero is built for multi-channel commerce. With a few clicks, you can connect your stores. ShipHero will download new products, as well as sync existing ones. When changes are made to your inventory all connected stores will be updated.
    Learn More
  • 1
    PoshC2

    PoshC2

    C2 framework used to aid red teamers with post-exploitation

    ...These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX. Shellcode containing in-build AMSI bypass and ETW patching for a high success rate and stealth. Auto-generated Apache Rewrite rules for use in a C2 proxy, protecting your C2 infrastructure and maintaining good operational security. Fully encrypted communications, protecting the confidentiality and integrity of the C2 traffic.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Sliver

    Sliver

    Adversary Emulation Framework

    Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys. The server and client support MacOS, Windows, and Linux. Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all).
    Downloads: 49 This Week
    Last Update:
    See Project
  • 3
    emp3r0r

    emp3r0r

    Linux/Windows post-exploitation framework made by linux user

    ...It was a learning process for me trying to implement common Linux adversary techniques and some of my original ideas. So, what makes emp3r0r different? First of all, it is the first C2 framework that targets Linux platform including the capability of using any other tools through it. Take a look at the features for more valid reasons to use it.
    Downloads: 46 This Week
    Last Update:
    See Project
  • 4
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 8 This Week
    Last Update:
    See Project
  • The fastest way to host, scale and get paid on WordPress Icon
    The fastest way to host, scale and get paid on WordPress

    For developers searching for a web hosting solution

    Lightning-fast hosting, AI-assisted site management, and enterprise payments all in one platform designed for agencies and growth-focused businesses.
    Learn More
  • 5
    Merlin HTTP/2

    Merlin HTTP/2

    Merlin is a cross-platform post-exploitation HTTP/2 Command

    Merlin is a cross-platform post-exploitation Command & Control server and agent written in Go. The Merlin server is a self-contained command line program that requires no installation. You just simply download it and run it. The command-line interface only works great if it will be used by a single operator at a time. The Merlin agent can be controlled through Mythic, which features a web-based user interface that enables multiplayer support, and a slew of other features inherent to the project.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    Equation Math Solver

    Equation Math Solver

    Equation Math Solver

    Equation Solver is a piece of software designed to help you execute second (a*x^2+b*x+c=0) and first (b*x+c=0) degree equations, along with simple linear systems (a1*x+b1*y+c1=0 and a2*x+b2*y+c2=0). It doesn't come packed with complicated options or configuration parameters, making it accessible to math students who don't have heavy PC experience. My blog: https://vegettadbz.blogspot.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    TheHive

    TheHive

    Scalable, open source and free security incident response platform

    ...Multiple analysts from one organization can work together on the same case simultaneously. For example, an analyst may deal with malware analysis while another may work on tracking C2 beaconing activity on proxy logs as soon as IOCs have been added by their coworker.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 8
    SharPyShell

    SharPyShell

    Tiny and obfuscated ASP.NET webshell for C# web applications

    ...The main aim of this framework is to provide the penetration tester with a series of tools to ease the post-exploitation phase once exploitation has been successful against an IIS webserver. This tool is not intended as a replacement for the frameworks for C2 Server (i.e. Meterpreter, Empire, etc..) but this should be used when you land on a fully restricted server where inbound and outbound connections are very limited. In this framework, you will have all the tools needed to privesc, net discovery, and lateral movement as you are typing behind the cmd of the target server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Alan Framework

    Alan Framework

    A C2 post-exploitation framework

    Alan Framework is a post-exploitation framework useful during red-team activities. You can run your preferred tool directly in-memory. JavaScript script execution (in-memory without third party dependency) Fully compliant SOCKS5 proxy. Supported agent types: Powershell (x86/x64), DLL (x86/x64), Executable (x86/x64), Shellcode (x86/x64). Server.exe can be executed in Linux (via dotnet core) The network communication is fully encrypted with a session key not recoverable from the agent binary...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Curtain LogTrace File Activity Monitoring Icon
    Curtain LogTrace File Activity Monitoring

    For any organizations (up to 10,000 PCs)

    Curtain LogTrace File Activity Monitoring is an enterprise file activity monitoring solution. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities.
    Learn More
  • 10
    RMX1941

    RMX1941

    Here you get all unofficially released Realme C2 roms

    Leader badge">
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    All about RealMe C2 (RMX1941/1945)- Stock Firmware, ROM, Guides, MODs, NEWS, everything. SourceForge : https://sourceforge.net/projects/realme-c2/files/ Group : https://t.me/RealmeC2Community Channel : https://t.me/realmec2update
    Leader badge">
    Downloads: 267 This Week
    Last Update:
    See Project
  • 12
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    PowerShell Suite

    PowerShell Suite

    My musings with PowerShell

    PowerShell-Suite is a curated collection of PowerShell utility scripts and modules created to provide low-level Windows API access, process manipulation, debugging detection, security operations, and post-exploitation techniques directly from PowerShell. The project is licensed under BSD-3-Clause. Among its components, there are scripts like Invoke-Runas (to launch processes under alternate credentials via CreateProcessWithLogonW), Invoke-CreateProcess (to spawn processes with fine control...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BlackMamba

    BlackMamba

    C2/post-exploitation framework

    Black Mamba is a Command and Control (C2) that works with multiple connections at same time. It was developed with Python and with Qt Framework and have multiple features for a post-exploitation step.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    VENOM C2 shellcode

    VENOM C2 shellcode

    C2 shellcode generator/compiler/handler

    The script will use msfvenom (metasploit) to generate shellcode in different formats ( C# | python | ruby | dll | msi | hta-psh | doc | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into one template (example: python) "the python function will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a handler to receive the remote connection (shell or meterpreter) venom...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    phpsploit

    phpsploit

    Full-featured C2 framework which silently persists on webserver

    Full-featured C2 framework which silently persists on webserver via polymorphic PHP oneliner. The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor. Detailed help for any option (help command) Cross-platform on both client and server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SHAD0W

    SHAD0W

    A post exploitation framework designed to operate covertly

    ...Dynamically resolved syscalls are heavily used to avoid userland API hooking, anti-DLL injection to make it harder for EDR to load code into the beacons, and official Microsoft mitigation methods to protect spawn processes. Runs fully inside of Docker allowing cross-platform usage. SHAD0W is a modular C2 framework designed to successfully operate on mature environments. All traffic between beacons and the C2 are encrypted and transmitted over HTTPS.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Beamology

    Beamology

    Beamology: Semicom Project Management

    Beamology is the leading field of project management for SuperWikia Alpha semicom codesmiths. Its residency programs offer vital resources for SuperWikia vertical environment development and utilities needed for SA-VEC certification. Beamology residents are automatically licensed to access the Transcom system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Odroid C2 MotionVideo

    Odroid C2 MotionVideo

    Pearl Motion Video Server for Odroid C2

    Based on Ubuntu 18.04 with 3.16.75 kernel. Featuring preinstalled and active upon first boot Motion Video Surveillance Software running in User Mode not root. Includes preinstalled Apache Web Server and WebMin to manage your system through web interface. Boots into Pearl's Lightweight MATE desktop with most features from Pearl's 7.0 release if not preinstalled available through our repo.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    OLiA

    OWL/DL ontologies for linguistic annotations

    ...The OLiA Reference Model itself is linked to community-maintained repositories such as GOLD (http://linguistics-ontology.org/) and ISOcat (http://www.isocat.org) The OLiA ontologies were originally developed as part of an infrastructure for the sustainable maintenance of linguistic resources (http://www.sfb441.uni-tuebingen.de/c2/index-engl.html), their fields of application include the formalization of annotation schemes, concept-based querying over heterogeneously annotated corpora, and the development of interoperable NLP pipelines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Easy Age
    Easy Age is a software for Windows for evaluation skeletal age through the cervical vertebrae C2, C3 and C4. Used in dentistry in orthodontics, jaw functional orthopedics, pediatric dentistry and implantology. O Easy Age é um software for Windows para a estimação da idade óssea através das vértebras cervicais C2, C3 e C4. Utilizado na odontologia nas especialidades de ortodontia, ortopedia funcional, odontopediatria e implantodontia.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Pearl MATE-7-Odroid-C1+ and C2

    Pearl MATE-7-Odroid-C1+ and C2

    Pearl MATE 7 (18.04) with KODI for the ODROID C1+ and C2

    Built from Ubuntu base 18.04 with the 3.10.107 kernel. Pearl MATE 7 with KODI features the default features from the 64 and 32 bit PearlMATE 7 releases. For the C2 Kernel 3.16.57 is used. That is the main difference in the OS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    StrategyStateGenerator

    Generator for strategy and/or state pattern code in Java

    New version 2.0.4 is available since April, 4th 2017 ========================================= Please download from here: https://sourceforge.net/projects/strategystategenerator/files/strategy-state-generator-2.0.4/ Description =========== The *Strategy/State Generator* creates Java Source Code for classes representing strategies of strategy pattern or states of state pattern in a half-automated way. The *State Pattern* and the *Strategy Pattern* are from a technical view identical (see [Design Pattern](http://c2.com/cgi/wiki?StrategyPattern)). Thus the ancestor project [Strategy Generator](https://sourceforge.net/projects/strategygenerator/) has been adapted as new project *Strategy/State Generator* to generate also *State Pattern* Java source code. Please, note, that the API of this project and [Strategy Generator](https://sourceforge.net/projects/strategygenerator/) are similar but not identical. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PowerSploit PowerShell

    PowerSploit PowerShell

    A PowerShell Post-Exploitation Framework

    PowerSploit is a collection of PowerShell modules that historically served as a toolkit for post-exploitation tasks, red-team exercises, and offensive-security research—covering areas like reconnaissance, lateral movement, persistence, and situational awareness. The repository bundles many focused scripts: code to enumerate system and Active Directory information, payload generation helpers, in-memory execution utilities, and modules to interact with credentials and services. Because the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Проект Wolframium
    Modified MIUI V6 for Zopo ZP980\C2\C3 phones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next