Open source C2 server created for stealth red team operations
☆837Sep 26, 2022Updated 3 years ago
Alternatives and similar repositories for Ninja
Users that are interested in Ninja are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open source pre-operation C2 server based on python and powershell☆765Jul 6, 2021Updated 4 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,096Nov 20, 2025Updated 4 months ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆415Dec 19, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,740Jan 16, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,649Jul 18, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,153Apr 17, 2025Updated 11 months ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,098Updated this week
- A modular C2 framework☆517Mar 20, 2026Updated last week
- A collaborative, multi-platform, red teaming framework☆4,372Mar 21, 2026Updated last week
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,098Apr 19, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,330Dec 6, 2023Updated 2 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,864Aug 12, 2021Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,610Jul 10, 2023Updated 2 years ago
- A C2 post-exploitation framework☆486Jan 24, 2024Updated 2 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆824Aug 23, 2021Updated 4 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆505Mar 11, 2024Updated 2 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆991Oct 7, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆169Dec 8, 2022Updated 3 years ago
- Adversary Emulation Framework☆10,910Updated this week
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,502Dec 21, 2023Updated 2 years ago
- Open-Source Shellcode & PE Packer☆2,084Feb 3, 2024Updated 2 years ago
- grim reaper c2☆348Nov 19, 2022Updated 3 years ago
- ☆361Apr 24, 2021Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,652Aug 28, 2025Updated 7 months ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆495Apr 1, 2021Updated 4 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- Payload Generation Framework☆1,979Aug 21, 2024Updated last year
- Starkiller is a Frontend for PowerShell Empire.☆1,642Mar 3, 2026Updated 3 weeks ago
- Small and convenient C2 tool for Windows targets☆614Mar 8, 2022Updated 4 years ago
- Overlord - Red Teaming Infrastructure Automation☆630May 28, 2024Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,525Apr 17, 2025Updated 11 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,092Feb 25, 2026Updated last month