GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
☆640Mar 28, 2025Updated last year
Alternatives and similar repositories for GC2-sheet
Users that are interested in GC2-sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques and used by Patchwork group.☆835Jul 2, 2024Updated last year
- A C# Command & Control framework☆1,030Mar 28, 2024Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,375Oct 27, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,096Updated this week
- The swiss army knife of LSASS dumping☆2,088Sep 17, 2024Updated last year
- A collaborative, multi-platform, red teaming framework☆4,409Updated this week
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- ☆1,803Aug 30, 2024Updated last year
- The Havoc Framework☆8,274Dec 18, 2025Updated 3 months ago
- A light-weight first-stage C2 implant written in Nim (and Rust).☆940Mar 2, 2026Updated last month
- A tool to kill antimalware protected processes☆1,509Jun 19, 2021Updated 4 years ago
- Template-Driven AV/EDR Evasion Framework☆1,790Nov 3, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- evilginx3 + gophish☆1,977Jun 15, 2024Updated last year
- Kill AV/EDR leveraging BYOVD attack☆397Jul 11, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆372Dec 24, 2021Updated 4 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,563Aug 20, 2024Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆629Jun 25, 2024Updated last year
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,746Jan 16, 2026Updated 3 months ago
- Open source pre-operation C2 server based on python and powershell☆764Jul 6, 2021Updated 4 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,204Apr 16, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,409Nov 22, 2023Updated 2 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,616Jul 31, 2024Updated last year
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,066Oct 14, 2025Updated 6 months ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆488Feb 24, 2023Updated 3 years ago
- TartarusGate, Bypassing EDRs☆661Jan 25, 2022Updated 4 years ago
- Nimbo-C2 is yet another (simple and lightweight) C2 framework☆443Jan 29, 2026Updated 2 months ago
- HVNC for Cobalt Strike☆1,317Dec 7, 2023Updated 2 years ago
- ☆1,531Aug 11, 2023Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,231Aug 18, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Adversary Emulation Framework☆10,986Updated this week
- Spartacus DLL/COM Hijacking Toolkit☆1,077Feb 1, 2024Updated 2 years ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,145Nov 28, 2024Updated last year
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,099Nov 20, 2025Updated 4 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆742May 19, 2023Updated 2 years ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆406Nov 26, 2025Updated 4 months ago
- Shoggoth: Asmjit Based Polymorphic Encryptor☆783Apr 4, 2026Updated last week