0xSs0rZ
Ctrlk
  • Hello World
  • Whoami
  • Interesting Books
  • Pentest
    • CheckLists
    • Recon
    • Protocols
    • Brute force
    • Shells
    • File Transfer
    • Web attacks
    • API
    • Public Exploit
    • External Pentest
    • Internal Pentest
    • Privilege Escalation
    • Post Exploitation
    • Cracking
    • Thick Client Pentest
    • Wifi Pentest
    • Mobile Pentest
    • Configuration Audit / Hardening
    • Code Analysis
    • Tools
    • Search Engines
    • Cheatsheets
    • Note Keeping / Reporting / Admin Stuff
  • Cloud
    • Cloud VM
    • Enumeration
    • SSRF / RCE
    • Azure
    • AWS
    • GCP
    • Kubernetes
    • Tools
  • Labs
  • Antivirus Evasion - Defender
    • Mindmap
    • Defender Module for PowerShell
    • Static Analysis
    • Dynamic Analysis
    • AMSI Bypass
    • Process Injection
    • Open-Source Software
    • User Access Control (UAC)
    • AppLocker
    • LOLBAS / LOLDrivers / LOLESXi
    • PowerShell ConstrainedLanguage Mode, CLM
    • VBScript
    • Bypass all Powershell security features (AMSI,CLM)
    • Bypass AV Payload / Shells
    • Find Folder Exclusions
    • Resources
  • EDR BYPASS
    • Approches for Evasion
    • Tools
    • Obfuscation
    • EDR Killer
    • BYOVD
    • Spoof Command Line Arguments
    • Blind Spots
    • Living Off Security Tools / LOTTunels
    • Process Hollowing
    • Process Injection - Reverse Shell
    • Payload Creation
    • Shellcode Loader
    • MalDev
    • Malware Testing Lab
    • Resources
  • Red Team
    • OpSec / Anonymity
    • Initial Access
    • Infrastructure (phishing, C2, redirector)
    • C2
    • EDR / AV Bypass
    • Physical Penetration Testing
    • Bypass Bitlocker
    • Resources
  • CTF
    • OSINT
    • Forensic
    • Cryptography
    • Steganography
    • Write Up
Powered by GitBook
On this page
  • Bear C2
  • Havoc C2
  • Adaptix
  • Emp3ror
  • HardHat C2
  • LOL C2
  1. Red Team

C2

https://github.com/APTIRAN/C2/tree/maingithub.com

Bear C2

Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA and ChaCha to secure communication between the payload and the operator machine.

LogoBear C2 Exposed: Russian APT's Advanced Encryption TacticsPenetration Testing Tools
LogoGitHub - S3N4T0R-0X0/BEAR: Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA and ChaCha to secure communication between the payload and the operator machine.GitHub

Havoc C2

LogoGitHub - WesleyWong420/RedTeamOps-Havoc-101: Materials for the workshop "Red Team Ops: Havoc 101"GitHub
LogoHAVOC 101 Workshop [RedTeam]⌈ℙiκÅℝøøτ⌋

Adaptix

LogoGitHub - badsectorlabs/ludus_adaptix_c2: An Ansible role that install the Adaptix C2 server and/or client on Debian based hostsGitHub

Emp3ror

LogoGitHub - jm33-m0/emp3r0r: Linux/Windows post-exploitation framework made by linux userGitHub

HardHat C2

LogoGitHub - DragoQCC/CrucibleC2: A C# Command & Control frameworkGitHub

LOL C2

LOLC2lolc2.github.io

Github C2

LogoGitHub - offalltn/gitC2: POC of GITHUB simple C2 in rustGitHub
PreviousInfrastructure (phishing, C2, redirector)NextEDR / AV Bypass

Last updated 5 months ago