C2 Powershell Command & Control Framework with BuiltIn Commands
☆505Mar 11, 2024Updated 2 years ago
Alternatives and similar repositories for meterpeter
Users that are interested in meterpeter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Assist reverse tcp shells in post-exploration tasks☆220Oct 17, 2025Updated 5 months ago
- Open source C2 server created for stealth red team operations☆837Sep 26, 2022Updated 3 years ago
- venom - C2 shellcode generator/compiler/handler☆1,943Dec 9, 2023Updated 2 years ago
- PowerShell ReverseTCP Shell - Framework☆1,064Sep 18, 2022Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,152Dec 11, 2025Updated 3 months ago
- Python AV Evasion Tools☆518Oct 14, 2025Updated 5 months ago
- Open source pre-operation C2 server based on python and powershell☆765Jul 6, 2021Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,168Sep 29, 2021Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,153Apr 17, 2025Updated 11 months ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆600Aug 27, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,095Nov 20, 2025Updated 4 months ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,098Updated this week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,740Jan 16, 2026Updated 2 months ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,575Nov 9, 2021Updated 4 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆337Dec 23, 2021Updated 4 years ago
- A PowerShell script anti-virus evasion tool☆1,174Mar 19, 2023Updated 3 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆415Dec 19, 2020Updated 5 years ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,098Apr 19, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated 2 weeks ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆825Nov 15, 2025Updated 4 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Dec 9, 2019Updated 6 years ago
- collection of articles/books about programing☆587Dec 20, 2023Updated 2 years ago
- Windows AV Evasion☆839Apr 13, 2020Updated 5 years ago
- Open-Source Shellcode & PE Packer☆2,080Feb 3, 2024Updated 2 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,862Aug 12, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Small and convenient C2 tool for Windows targets☆614Mar 8, 2022Updated 4 years ago
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,330Dec 6, 2023Updated 2 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆540Sep 18, 2022Updated 3 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,421Jul 20, 2020Updated 5 years ago