BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalog of beacons and a clear schema to add more beacons over time.
☆94Jan 14, 2026Updated 2 months ago
Alternatives and similar repositories for BeaconatorC2
Users that are interested in BeaconatorC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 8 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆111Jul 21, 2025Updated 8 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆107Jul 23, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 9 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 8 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆33Sep 5, 2025Updated 7 months ago
- ☆28Mar 14, 2026Updated 3 weeks ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆139Apr 6, 2026Updated last week
- ☆76Jul 12, 2025Updated 9 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 11 months ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 8 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆29Jul 21, 2025Updated 8 months ago
- Stealthily inject shellcode into an executable☆459Oct 19, 2025Updated 5 months ago
- A tool to transform Chromium browsers into a C2 Implant☆573Dec 17, 2025Updated 3 months ago
- Execute shellcode via ASPNET compiler☆60Oct 2, 2025Updated 6 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 9 months ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Apr 5, 2026Updated last week
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 8 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆130Nov 17, 2025Updated 4 months ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 2 months ago
- Group Policy Objects manipulation and exploitation framework☆299Dec 7, 2025Updated 4 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last month
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆409Aug 18, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Adversary Simulation Framework☆39Aug 19, 2025Updated 7 months ago
- ☆26Aug 11, 2025Updated 8 months ago
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 7 months ago
- ☆60Oct 24, 2024Updated last year
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆78Mar 24, 2026Updated 2 weeks ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆104Jan 9, 2026Updated 3 months ago
- Static binary analysis with Detect It Easy — 100% in your browser, no uploads.☆57Feb 10, 2026Updated 2 months ago