xRET2pwn / PickleC2View external linksLinks
PickleC2 is a post-exploitation and lateral movements framework
☆96Jul 26, 2021Updated 4 years ago
Alternatives and similar repositories for PickleC2
Users that are interested in PickleC2 are comparing it to the libraries listed below
Sorting:
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Dec 19, 2020Updated 5 years ago
- Simple executable generator with encrypted shellcode.☆280Oct 3, 2022Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Dec 28, 2023Updated 2 years ago
- Open source C2 server created for stealth red team operations☆838Sep 26, 2022Updated 3 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆503Mar 11, 2024Updated last year
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,151Apr 17, 2025Updated 9 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆193May 22, 2022Updated 3 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Nov 10, 2022Updated 3 years ago
- A C2 post-exploitation framework☆483Jan 24, 2024Updated 2 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Sep 9, 2021Updated 4 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆200Sep 21, 2021Updated 4 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆203Aug 1, 2025Updated 6 months ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Feb 16, 2023Updated 2 years ago
- Basic C2 Server☆193Jul 3, 2021Updated 4 years ago
- Open source pre-operation C2 server based on python and powershell☆761Jul 6, 2021Updated 4 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,090Nov 20, 2025Updated 2 months ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆463Jul 15, 2022Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Feb 9, 2022Updated 4 years ago
- Lightweight C# windows agent for Apfell☆17Mar 16, 2020Updated 5 years ago
- PowerShell payload generator☆120Sep 30, 2021Updated 4 years ago
- Enumerate Domain Data☆335Sep 13, 2023Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆422May 21, 2022Updated 3 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- ☆1,456Jan 23, 2024Updated 2 years ago
- ☆28May 25, 2021Updated 4 years ago
- Hide your payload in DNS☆617May 3, 2023Updated 2 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Jan 24, 2026Updated 2 weeks ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Sep 4, 2021Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Sep 21, 2025Updated 4 months ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 4 years ago