Basic C2 Server
☆198Jul 3, 2021Updated 4 years ago
Alternatives and similar repositories for BabyShark
Users that are interested in BabyShark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255May 1, 2023Updated 2 years ago
- Open source pre-operation C2 server based on python and powershell☆767Jul 6, 2021Updated 4 years ago
- Open source C2 server created for stealth red team operations☆842Sep 26, 2022Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆97Jul 26, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A modular C2 framework☆527Apr 15, 2026Updated 2 weeks ago
- [POC] Asynchronous reverse shell using the HTTP protocol.☆273May 23, 2025Updated 11 months ago
- Tool to deploy a post-exploitation prompt at any time☆323May 28, 2021Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆125Dec 27, 2020Updated 5 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆69Sep 4, 2023Updated 2 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆808Dec 19, 2023Updated 2 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,159Apr 17, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆169Dec 8, 2022Updated 3 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,102Apr 13, 2026Updated 2 weeks ago
- ☆69May 22, 2023Updated 2 years ago
- Discord as a C2☆49Jan 4, 2021Updated 5 years ago
- A C2 post-exploitation framework☆487Jan 24, 2024Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,173Sep 29, 2021Updated 4 years ago
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆637Oct 18, 2025Updated 6 months ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆241Aug 12, 2020Updated 5 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,318Jan 31, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆240Nov 8, 2019Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆496Apr 1, 2021Updated 5 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,105Nov 20, 2025Updated 5 months ago
- ☆113Aug 5, 2020Updated 5 years ago
- ☆171May 20, 2021Updated 4 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆507Mar 11, 2024Updated 2 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆598Aug 27, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,205Apr 16, 2025Updated last year
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- Slack C2bot that executes commands and returns the output.☆49Mar 13, 2023Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,755Jan 16, 2026Updated 3 months ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Jan 13, 2023Updated 3 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆416Dec 19, 2020Updated 5 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago