Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
-
Updated
May 23, 2024 - PowerShell
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Adversary Emulation Framework
A command and control framework.
Malicious IP source.
Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.
Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threatfox.
Windows C++ Implant for Exploration C2
TeamServer and Client of Exploration Command and Control Framework
Nimbo-C2 is yet another (simple and lightweight) C2 framework
Simple Powershell Http shell With WEB UI
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
🔎🪲 Malleable C2 profiles parser and assembler written in golang
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
Follow my cybersecurity journey as I explore CTF, Red Teaming, and Malware Analysis. Dive into challenges, insights, and discoveries.
Add a description, image, and links to the c2 topic page so that developers can more easily learn about it.
To associate your repository with the c2 topic, visit your repo's landing page and select "manage topics."