PickleC2 is a post-exploitation and lateral movements framework
☆97Jul 26, 2021Updated 4 years ago
Alternatives and similar repositories for PickleC2
Users that are interested in PickleC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆416Dec 19, 2020Updated 5 years ago
- Simple executable generator with encrypted shellcode.☆281Oct 3, 2022Updated 3 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- Open source C2 server created for stealth red team operations☆843Sep 26, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆179Nov 10, 2022Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆105Dec 28, 2023Updated 2 years ago
- A C2 post-exploitation framework☆488Jan 24, 2024Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- ☆29May 25, 2021Updated 4 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,161Apr 17, 2025Updated last year
- Basic C2 Server☆198Jul 3, 2021Updated 4 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆507Mar 11, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆206Apr 2, 2026Updated last month
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Sep 9, 2021Updated 4 years ago
- Lightweight C# windows agent for Apfell☆17Mar 16, 2020Updated 6 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,106Nov 20, 2025Updated 5 months ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆69Sep 4, 2023Updated 2 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆465Jul 15, 2022Updated 3 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆62Feb 16, 2023Updated 3 years ago
- Open source pre-operation C2 server based on python and powershell☆766Jul 6, 2021Updated 4 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆22Jul 4, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Hide your payload in DNS☆613May 3, 2023Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Feb 9, 2022Updated 4 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆44Feb 25, 2023Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Mar 9, 2021Updated 5 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆95Sep 21, 2025Updated 7 months ago
- Enumerate Domain Data☆335Sep 13, 2023Updated 2 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- ☆1,451Jan 23, 2024Updated 2 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Sep 4, 2021Updated 4 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆598Aug 27, 2024Updated last year
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- PIC lsass dumper using cloned handles☆594Oct 18, 2022Updated 3 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆68Oct 31, 2021Updated 4 years ago