c2
Here are 19 public repositories matching this topic...
Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for security professionals and enthusiasts.
-
Updated
Mar 13, 2024 - C
A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.
-
Updated
Apr 1, 2024 - C
EternalHush - new free advanced open-source c2 framework
-
Updated
Oct 28, 2023 - C
C2 extensible for post-explotation and remote control
-
Updated
Mar 4, 2024 - C
the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.
-
Updated
Sep 8, 2024 - C
an armarda of tools for stealthily infiltration and post exploitation
-
Updated
Oct 28, 2023 - C
C2 : Command and Control Server for the Trojan Backdoor, acting as Remote access tool. Trojan Execution
-
Updated
Sep 11, 2024 - C
custom c2 framework with beacons for both linux and windows
-
Updated
Mar 29, 2024 - C
Another Mirai Varient from two years ago
-
Updated
Aug 4, 2024 - C
Cosmic Mirai Botnet Make for education!
-
Updated
Jul 10, 2023 - C
Dynamic encryption method ransomware
-
Updated
Jun 19, 2024 - C
This is the C code for the Remote Access Trojan (RAT) client. It performs various functions such as encryption/decryption, sending/receiving ICMP packets, and anti-debugging measures.
-
Updated
Jul 11, 2024 - C
Improve this page
Add a description, image, and links to the c2 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the c2 topic, visit your repo's landing page and select "manage topics."