Octopus
C2 server
An open-source pre-operation C2 server that enables stealthy control and information gathering before a red team operation.
Open source pre-operation C2 server based on python and powershell
736 stars
39 watching
155 forks
Language: Python
last commit: over 3 years ago c2pentestingpowershellpythonredteamsecurity
Related projects:
Repository | Description | Stars |
---|---|---|
| An AWS-based C2 infrastructure project built with Ansible that enables the creation of Cobalt Strike and RedELK servers for red team operations. | 221 |
| A collection of Cobalt Strike Malleable C2 profiles mimicking malicious Windows update processes | 34 |
| A C2 framework aiding penetration testers with post-exploitation and lateral movement | 1,841 |
| A framework for executing and analyzing post-exploitation attacks in a controlled environment | 171 |
| A library for integrating communication channels with an external Command and Control (C2) server | 281 |
| A command line tool that generates randomized C2 malleable profiles for use in threat simulation and red teaming exercises. | 1,024 |
| Python SDK for accessing and downloading ocean data from the Ocean Data Platform | 11 |
| A Python framework for building data transfer interfaces between frameworks and Command and Control systems. | 228 |
| Automates the creation of Red Teaming infrastructure on cloud providers like AWS and Digital Ocean. | 615 |
| A post-exploitation command and control framework that supports multiple communication methods and interacts with compromised machines | 1,098 |
| Converts HTTP requests from Burp Suite into a format compatible with Cobalt Strike Malleable C2 profiles. | 371 |
| A Python API providing access to the Homematic CCU for home automation | 34 |
| A collection of C2 profiles used in post-exploitation frameworks | 342 |
| An implementation of Cobalt Strike's External C2 specification using .NET libraries | 84 |
| Generates random C2 profiles for testing and simulation | 631 |