A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).
☆68Dec 17, 2025Updated 4 months ago
Alternatives and similar repositories for TibaneC2
Users that are interested in TibaneC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC of GITHUB simple C2 in rust☆54Jul 27, 2025Updated 9 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 11 months ago
- List of some AD tools I frequently use☆58Nov 2, 2025Updated 6 months ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆75Mar 27, 2026Updated last month
- Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagemen…☆145Mar 8, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 6 months ago
- ☆37Jul 1, 2025Updated 10 months ago
- Rust crate to parse user-mode minidump files generated on Windows☆18Nov 17, 2025Updated 5 months ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆110Jan 18, 2026Updated 3 months ago
- Inject scripts into gzipped pages without decompression☆14Feb 4, 2026Updated 3 months ago
- Awesome MalDev Links☆58Apr 28, 2026Updated last week
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆45Aug 2, 2025Updated 9 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆154Apr 18, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆50Oct 14, 2025Updated 6 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 8 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆97Aug 23, 2025Updated 8 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 9 months ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated last month
- ☆46Feb 12, 2026Updated 2 months ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆74Dec 26, 2025Updated 4 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated 11 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆130Aug 19, 2025Updated 8 months ago
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated 2 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 3 months ago
- ☆24Jan 27, 2026Updated 3 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- Modern PIC implant for Windows (64 & 32 bit)☆107Jul 23, 2025Updated 9 months ago
- Dynamic Indirect Syscalls via JOP/ROP in Pure no_std, no_alloc, no dependency Rust☆44Aug 6, 2025Updated 9 months ago
- UDC2 implementation that provides an ICMP C2 channel☆123Nov 24, 2025Updated 5 months ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Easy peasy file uploads☆35Aug 29, 2025Updated 8 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆87Apr 26, 2025Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆141Dec 8, 2025Updated 4 months ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆108Apr 16, 2026Updated 2 weeks ago
- Thats it! An Open-Source Windows UEFI Rootkit☆29Jul 19, 2025Updated 9 months ago
- A Mythic agent for Windows written in C☆162Apr 9, 2026Updated 3 weeks ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago