 C2-Tool-Collection
 C2-Tool-Collection 
 Windows exploit tools
 Tools for exploiting vulnerabilities in Windows systems and gathering information about networked computers.
A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
1k stars
 19 watching
 198 forks
 
Language: C 
last commit: about 2 years ago 
Linked from   1 awesome list  
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | Tool to generate inline assembly code for direct system calls in COBalt Strike's Beacon Object Files (BOF) | 308 | 
|  | A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 | 
|  | Automates an Active Directory password spraying attack to identify weak or guessable passwords | 426 | 
|  | A collection of C# tooling and POCs for operating system exploitation and vulnerability assessment. | 1,383 | 
|  | An exploit tool that uses direct system calls to enumerate processes based on specific loaded modules or process handles | 266 | 
|  | A tool to enable WDigest credential caching using direct system calls in Cobalt Strike | 213 | 
|  | An exploit technique allowing interaction with Windows software firewall via COM interfaces. | 100 | 
|  | A post-exploitation framework that enables red-team activities by providing a set of tools for infiltrating and controlling systems remotely. | 464 | 
|  | An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 | 202 | 
|  | Automates deployment of Windows and Active Directory test lab networks. | 480 | 
|  | Lists available Cobalt Strike beacon commands and colors them based on their type | 191 | 
|  | Creates hidden registry keys to persist data despite DFIR investigation | 468 | 
|  | A collection of Cobalt Strike scripts designed to facilitate red teaming and exploitation | 800 | 
|  | A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. | 24 | 
|  | An implementation of HVNC for Cobalt Strike, allowing operators to interact with remote desktop sessions without user knowledge. | 1,171 |