Open source C2 server created for stealth red team operations
☆843Sep 26, 2022Updated 3 years ago
Alternatives and similar repositories for Ninja
Users that are interested in Ninja are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open source pre-operation C2 server based on python and powershell☆766Jul 6, 2021Updated 4 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,106Nov 20, 2025Updated 5 months ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆416Dec 19, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,174Sep 29, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,756Jan 16, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,680Jul 18, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,882Aug 18, 2023Updated 2 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,161Apr 17, 2025Updated last year
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,103Apr 13, 2026Updated 3 weeks ago
- A modular C2 framework☆530May 1, 2026Updated last week
- A collaborative, multi-platform, red teaming framework☆4,442May 1, 2026Updated last week
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,166Mar 31, 2021Updated 5 years ago
- Hide your payload in DNS☆613May 3, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,102Apr 19, 2023Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255May 1, 2023Updated 3 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,338Dec 6, 2023Updated 2 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,869Aug 12, 2021Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,633Jul 10, 2023Updated 2 years ago
- A C2 post-exploitation framework☆488Jan 24, 2024Updated 2 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆828Aug 23, 2021Updated 4 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆507Mar 11, 2024Updated 2 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆993Oct 7, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆169Dec 8, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,503Dec 21, 2023Updated 2 years ago
- Adversary Emulation Framework☆11,160Updated this week
- Open-Source Shellcode & PE Packer☆2,098Feb 3, 2024Updated 2 years ago
- grim reaper c2☆348Nov 19, 2022Updated 3 years ago
- ☆362Apr 24, 2021Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,663Aug 28, 2025Updated 8 months ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆496Apr 1, 2021Updated 5 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,386Oct 27, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- Payload Generation Framework☆1,979Aug 21, 2024Updated last year
- Small and convenient C2 tool for Windows targets☆614Mar 8, 2022Updated 4 years ago
- Starkiller is a Frontend for PowerShell Empire.☆1,649Apr 5, 2026Updated last month
- Overlord - Red Teaming Infrastructure Automation☆632May 28, 2024Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,536Apr 17, 2025Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,134Apr 19, 2026Updated 2 weeks ago