tc2
C2 stack examples
Provides example C2 stacks using Traefik for fronting malicious tools and services
treafik fronted c2 examples
26 stars
4 watching
5 forks
Language: Shell
last commit: about 4 years ago c2cobaltstrikecovenantredteamsecuritytraefik
Related projects:
Repository | Description | Stars |
---|---|---|
| A list of JARM hashes and ssl implementation fingerprints for various C2/red team tools | 135 |
| A C2 framework aiding penetration testers with post-exploitation and lateral movement | 1,841 |
| Automatically generated C2 feed data from Censys search results | 540 |
| A collection of C2 profiles used in post-exploitation frameworks | 342 |
| Automates conversion of Cobalt Strike profiles to modrewrite scripts for HTTP C2 redirection | 585 |
| A comprehensive guide and reference project for designing Cobalt Strike Malleable C2 profiles | 1,631 |
| A collection of pre-defined threat actor profiles used in Cobalt Strike | 771 |
| A command line tool that generates randomized C2 malleable profiles for use in threat simulation and red teaming exercises. | 1,024 |
| A C++ implementation of a Linux-based C2 communication system | 136 |
| A tutorial on Ltac2 tactics language for Coq proof scripting | 43 |
| A CobaltStrike External C2 for Websockets implemented in C++ | 194 |
| A library for integrating communication channels with an external Command and Control (C2) server | 281 |
| An implementation of Cobalt Strike's External C2 specification using .NET libraries | 84 |
| A C2 framework using BITS and direct syscalls to establish a covert communication channel | 215 |
| A framework for executing and analyzing post-exploitation attacks in a controlled environment | 171 |