GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
☆642Mar 28, 2025Updated last year
Alternatives and similar repositories for GC2-sheet
Users that are interested in GC2-sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques and used by Patchwork group.☆840Jul 2, 2024Updated last year
- A C# Command & Control framework☆1,032Mar 28, 2024Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,384Oct 27, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,103Apr 13, 2026Updated 3 weeks ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆68Oct 31, 2021Updated 4 years ago
- The swiss army knife of LSASS dumping☆2,109Sep 17, 2024Updated last year
- A collaborative, multi-platform, red teaming framework☆4,442Updated this week
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Jun 27, 2023Updated 2 years ago
- ☆1,812Aug 30, 2024Updated last year
- The Havoc Framework☆8,328Dec 18, 2025Updated 4 months ago
- A light-weight first-stage C2 implant written in Nim (and Rust).☆944Mar 2, 2026Updated 2 months ago
- A tool to kill antimalware protected processes☆1,515Jun 19, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Template-Driven AV/EDR Evasion Framework☆1,796Nov 3, 2023Updated 2 years ago
- evilginx3 + gophish☆1,988Jun 15, 2024Updated last year
- Kill AV/EDR leveraging BYOVD attack☆402Jul 11, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆373Dec 24, 2021Updated 4 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,565Aug 20, 2024Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆630Jun 25, 2024Updated last year
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,756Jan 16, 2026Updated 3 months ago
- Open source pre-operation C2 server based on python and powershell☆766Jul 6, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,207Apr 16, 2025Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,413Nov 22, 2023Updated 2 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,627Jul 31, 2024Updated last year
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,073Oct 14, 2025Updated 6 months ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆489Feb 24, 2023Updated 3 years ago
- TartarusGate, Bypassing EDRs☆662Jan 25, 2022Updated 4 years ago
- Nimbo-C2 is yet another (simple and lightweight) C2 framework☆445Jan 29, 2026Updated 3 months ago
- HVNC for Cobalt Strike☆1,323Dec 7, 2023Updated 2 years ago
- ☆1,532Aug 11, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,234Aug 18, 2023Updated 2 years ago
- Adversary Emulation Framework☆11,110Updated this week
- Spartacus DLL/COM Hijacking Toolkit☆1,079Feb 1, 2024Updated 2 years ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,155Nov 28, 2024Updated last year
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,106Nov 20, 2025Updated 5 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆743May 19, 2023Updated 2 years ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆406Nov 26, 2025Updated 5 months ago