#c2c

Villain
sponsor
Villain

Backdoor generator and multi-session handler for sessions sharing among connected sibling servers.

Kubesploit
Kubesploit

Cross-platform command & control server and agent focused on containerized environments.

Havoc
Havoc

Modern and malleable post-exploitation command and control framework.

merlin
merlin

Cross-platform post-exploitation HTTP/2 Command & Control server and agent.

pupy
pupy

Opensource, cross-platform C2 and post-exploitation framework written in python and C.

sliver
sliver

Adversary emulation framework.

SharpC2
SharpC2

Command and Control Framework written in C#.

NimPlant
NimPlant

A light-weight first-stage C2 implant written in Nim.

brute ratel
brute ratel

A customized command and control center for red team and adversary simulation.

AhMyth Android RAT
AhMyth Android RAT

Android remote administration tool.

Empire
Empire

Post-exploitation and adversary emulation framework that is used to aid Red Teams and pentesters.

Starkiller
Starkiller

Starkiller is a frontend for Empire.

Caldera
Caldera

Automated adversary emulation platform.

HardHat C2
HardHat C2

A cross-platform, collaborative, Command & Control framework.

Nimbo-C2
Nimbo-C2

Yet another (simple and lightweight) C2 framework.

Awesome-CobaltStrike
Awesome-CobaltStrike

List of awesome CobaltStrike resources.

PowerMeUp
PowerMeUp

A small library of powershell scripts for post exploitation that you may need or use!

phpsploit
phpsploit

Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor.

PoshC2
PoshC2

A proxy aware C2 framework used to aid with post-exploitation and lateral movement.

dnscat2
dnscat2

Create an encrypted command-and-control (C&C) channel over the DNS protocol.

PyExfil
PyExfil

Set as many exfiltration, techniques that CAN be used to bypass various.

TrevorC2
TrevorC2

A legitimate website that tunnels client/server communications for covert command execution.