GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
☆638Mar 28, 2025Updated 11 months ago
Alternatives and similar repositories for GC2-sheet
Users that are interested in GC2-sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques and used by Patchwork group.☆834Jul 2, 2024Updated last year
- A C# Command & Control framework☆1,027Mar 28, 2024Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,374Oct 27, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,098Updated this week
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- The swiss army knife of LSASS dumping☆2,083Sep 17, 2024Updated last year
- A collaborative, multi-platform, red teaming framework☆4,372Updated this week
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- ☆1,800Aug 30, 2024Updated last year
- The Havoc Framework☆8,256Dec 18, 2025Updated 3 months ago
- A light-weight first-stage C2 implant written in Nim (and Rust).☆938Mar 2, 2026Updated 3 weeks ago
- A tool to kill antimalware protected processes☆1,506Jun 19, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Template-Driven AV/EDR Evasion Framework☆1,786Nov 3, 2023Updated 2 years ago
- evilginx3 + gophish☆1,970Jun 15, 2024Updated last year
- Kill AV/EDR leveraging BYOVD attack☆397Jul 11, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,560Aug 20, 2024Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆627Jun 25, 2024Updated last year
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 11 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,740Jan 16, 2026Updated 2 months ago
- Open source pre-operation C2 server based on python and powershell☆765Jul 6, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,403Nov 22, 2023Updated 2 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,602Jul 31, 2024Updated last year
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,066Oct 14, 2025Updated 5 months ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,200Apr 16, 2025Updated 11 months ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆488Feb 24, 2023Updated 3 years ago
- TartarusGate, Bypassing EDRs☆657Jan 25, 2022Updated 4 years ago
- HVNC for Cobalt Strike☆1,309Dec 7, 2023Updated 2 years ago
- Nimbo-C2 is yet another (simple and lightweight) C2 framework☆438Jan 29, 2026Updated last month
- ☆1,532Aug 11, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,228Aug 18, 2023Updated 2 years ago
- Adversary Emulation Framework☆10,877Updated this week
- Spartacus DLL/COM Hijacking Toolkit☆1,080Feb 1, 2024Updated 2 years ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,136Nov 28, 2024Updated last year
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,095Nov 20, 2025Updated 4 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆740May 19, 2023Updated 2 years ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆405Nov 26, 2025Updated 4 months ago