BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalog of beacons and a clear schema to add more beacons over time.
☆92Jan 14, 2026Updated 2 months ago
Alternatives and similar repositories for BeaconatorC2
Users that are interested in BeaconatorC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆93Aug 3, 2025Updated 7 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 8 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 8 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- ☆28Mar 14, 2026Updated last week
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆132Sep 4, 2025Updated 6 months ago
- ☆75Jul 12, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Blog/Journal on how to backdoor VSCode extensions☆78Feb 24, 2026Updated 3 weeks ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 10 months ago
- A tool to transform Chromium browsers into a C2 Implant☆557Dec 17, 2025Updated 3 months ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- Stealthily inject shellcode into an executable☆453Oct 19, 2025Updated 5 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- Execute shellcode via ASPNET compiler☆62Oct 2, 2025Updated 5 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 6 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆112Jan 26, 2026Updated last month
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Updated this week
- Local SYSTEM auth trigger for relaying☆170Jul 22, 2025Updated 8 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆129Nov 17, 2025Updated 4 months ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Group Policy Objects manipulation and exploitation framework☆298Dec 7, 2025Updated 3 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆75Feb 27, 2026Updated 3 weeks ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last month
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆402Aug 18, 2025Updated 7 months ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 7 months ago
- ☆26Aug 11, 2025Updated 7 months ago
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 6 months ago
- ☆59Oct 24, 2024Updated last year
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago
- Static binary analysis with Detect It Easy — 100% in your browser, no uploads.☆57Feb 10, 2026Updated last month