UnkL4b / BabySharkView external linksLinks
Basic C2 Server
☆194Jul 3, 2021Updated 4 years ago
Alternatives and similar repositories for BabyShark
Users that are interested in BabyShark are comparing it to the libraries listed below
Sorting:
- Petaq - Purple Team Command & Control Server☆104Dec 8, 2022Updated 3 years ago
- Open source pre-operation C2 server based on python and powershell☆761Jul 6, 2021Updated 4 years ago
- Open source C2 server created for stealth red team operations☆838Sep 26, 2022Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- A modular C2 framework☆506Updated this week
- Tool to deploy a post-exploitation prompt at any time☆320May 28, 2021Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 5 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆193May 22, 2022Updated 3 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,151Apr 17, 2025Updated 9 months ago
- A C2 post-exploitation framework☆483Jan 24, 2024Updated 2 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆805Dec 19, 2023Updated 2 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,097Jun 25, 2024Updated last year
- [POC] Asynchronous reverse shell using the HTTP protocol.☆274May 23, 2025Updated 8 months ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆494Apr 1, 2021Updated 4 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆244Aug 12, 2020Updated 5 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆123Dec 27, 2020Updated 5 years ago
- Discord as a C2☆49Jan 4, 2021Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- ☆55Nov 11, 2021Updated 4 years ago
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆633Oct 18, 2025Updated 3 months ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- ☆114Aug 5, 2020Updated 5 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆239Nov 8, 2019Updated 6 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,305Jan 31, 2022Updated 4 years ago
- ☆170May 20, 2021Updated 4 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,090Nov 20, 2025Updated 2 months ago
- ☆19Dec 12, 2023Updated 2 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆604Aug 27, 2024Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,722Jan 16, 2026Updated 3 weeks ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,192Apr 16, 2025Updated 9 months ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Dec 19, 2020Updated 5 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆823Nov 15, 2025Updated 3 months ago
- ☆334Dec 8, 2022Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Jul 10, 2022Updated 3 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆503Mar 11, 2024Updated last year
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Jan 13, 2023Updated 3 years ago