The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
☆127Feb 18, 2024Updated 2 years ago
Alternatives and similar repositories for c2-cloud
Users that are interested in c2-cloud are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jun 15, 2025Updated 9 months ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated last year
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Turn your Raspberry Pi Pico into a hacking device☆13Mar 7, 2024Updated 2 years ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆537Nov 14, 2025Updated 4 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆201Jun 25, 2024Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆85May 7, 2023Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ↕️🤫 Stealth redirector for your red team operation security☆1,067Mar 1, 2026Updated 3 weeks ago
- Chrome extension tool for OSINT & Recon☆57Mar 12, 2024Updated 2 years ago
- A C# Command & Control framework☆1,027Mar 28, 2024Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆309Dec 9, 2023Updated 2 years ago
- ☆11Nov 17, 2024Updated last year
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆453Sep 29, 2023Updated 2 years ago
- Stage 0☆169Dec 18, 2024Updated last year
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆286Jun 8, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Real fucking shellcode encryptor & obfuscator tool☆1,015Jan 7, 2026Updated 2 months ago
- PowerShell Obfuscator☆236Mar 18, 2026Updated last week
- Generic PE loader for fast prototyping evasion techniques☆245Jul 2, 2024Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆565Feb 15, 2024Updated 2 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆501May 16, 2023Updated 2 years ago
- ☆52Feb 8, 2024Updated 2 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆378Dec 5, 2023Updated 2 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 5 years ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 4 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Jan 12, 2023Updated 3 years ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,422Jan 19, 2026Updated 2 months ago
- ☆568Mar 28, 2024Updated 2 years ago