Basic C2 Server
☆199Jul 3, 2021Updated 4 years ago
Alternatives and similar repositories for BabyShark
Users that are interested in BabyShark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Petaq - Purple Team Command & Control Server☆104Dec 8, 2022Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255May 1, 2023Updated 3 years ago
- Open source pre-operation C2 server based on python and powershell☆767Jul 6, 2021Updated 4 years ago
- Open source C2 server created for stealth red team operations☆845Sep 26, 2022Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆98Jul 26, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A modular C2 framework☆532May 8, 2026Updated last week
- [POC] Asynchronous reverse shell using the HTTP protocol.☆272May 23, 2025Updated 11 months ago
- Tool to deploy a post-exploitation prompt at any time☆323May 28, 2021Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆125Dec 27, 2020Updated 5 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆69Sep 4, 2023Updated 2 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆808Dec 19, 2023Updated 2 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,162Apr 17, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆169Dec 8, 2022Updated 3 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,112Apr 13, 2026Updated last month
- ☆69May 22, 2023Updated 2 years ago
- Discord as a C2☆49Jan 4, 2021Updated 5 years ago
- A C2 post-exploitation framework☆488Jan 24, 2024Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,172Sep 29, 2021Updated 4 years ago
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆638Oct 18, 2025Updated 7 months ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆242Aug 12, 2020Updated 5 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,322Jan 31, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆240Nov 8, 2019Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆499Apr 1, 2021Updated 5 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,107Nov 20, 2025Updated 5 months ago
- ☆113Aug 5, 2020Updated 5 years ago
- ☆171May 20, 2021Updated 5 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆506Mar 11, 2024Updated 2 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆596Aug 27, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,210Apr 16, 2025Updated last year
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Feb 3, 2022Updated 4 years ago
- Slack C2bot that executes commands and returns the output.☆49Mar 13, 2023Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,759Jan 16, 2026Updated 4 months ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Jan 13, 2023Updated 3 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆414Dec 19, 2020Updated 5 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆109Feb 12, 2023Updated 3 years ago