Open source C2 server created for stealth red team operations
☆839Sep 26, 2022Updated 3 years ago
Alternatives and similar repositories for Ninja
Users that are interested in Ninja are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open source pre-operation C2 server based on python and powershell☆764Jul 6, 2021Updated 4 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,099Nov 20, 2025Updated 4 months ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆416Dec 19, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,172Sep 29, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,746Jan 16, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,664Jul 18, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,878Aug 18, 2023Updated 2 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,158Apr 17, 2025Updated last year
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,096Updated this week
- A modular C2 framework☆523Apr 12, 2026Updated last week
- A collaborative, multi-platform, red teaming framework☆4,409Apr 10, 2026Updated last week
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Aug 18, 2023Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,166Mar 31, 2021Updated 5 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,096Apr 19, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Hide your payload in DNS☆613May 3, 2023Updated 2 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255May 1, 2023Updated 2 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,865Aug 12, 2021Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,619Jul 10, 2023Updated 2 years ago
- A C2 post-exploitation framework☆486Jan 24, 2024Updated 2 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆825Aug 23, 2021Updated 4 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆506Mar 11, 2024Updated 2 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆994Oct 7, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆169Dec 8, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,503Dec 21, 2023Updated 2 years ago
- Adversary Emulation Framework☆10,986Apr 10, 2026Updated last week
- Open-Source Shellcode & PE Packer☆2,087Feb 3, 2024Updated 2 years ago
- grim reaper c2☆347Nov 19, 2022Updated 3 years ago
- ☆361Apr 24, 2021Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,653Aug 28, 2025Updated 7 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆497Apr 1, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- Payload Generation Framework☆1,973Aug 21, 2024Updated last year
- Starkiller is a Frontend for PowerShell Empire.☆1,649Apr 5, 2026Updated 2 weeks ago
- Small and convenient C2 tool for Windows targets☆615Mar 8, 2022Updated 4 years ago
- Overlord - Red Teaming Infrastructure Automation☆631May 28, 2024Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,530Apr 17, 2025Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,116Apr 5, 2026Updated 2 weeks ago