search
Join or Log In

C2

Browse 15 cybersecurity tools tagged with "C2"

Brute Ratel C4

Brute Ratel C4

language

Offensive Security

Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

4.7(2)
HYAS Adversary Infrastructure Platform

HYAS Adversary Infrastructure

language

Threat Intelligence Platforms

HYAS Adversary Infrastructure Platform on SecurityListing: Platform for tracking adversary infrastructure and C2 communications

4.7(2)
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite

Cobalt Strike HTTP

language

Offensive Security

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

4.7(2)
PoshC2

PoshC2

language

Penetration Testing

PoshC2 on SecurityListing: A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

4.5(3)
Cobalt Strike's ExternalC2 framework

Cobalt Strike's ExternalC2

language

Penetration Testing

Cobalt Strike's ExternalC2 framework on SecurityListing: A specification/framework for extending default C2 communication channels in Cobalt Strike

4.5(1)
How to Write Malleable C2 Profiles for Cobalt Strike

How to Write

language

Offensive Security

How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset

4.5(1)
IronNet IronRadar

IronNet IronRadar

language

Threat Intelligence Platforms

IronNet IronRadar on SecurityListing: Proactive C2 threat intelligence feed for detecting adversary infrastructure

4.5(1)
GHH - Google Hack Honeypot

GHH - Google

language

Security Operations

GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

4.5(1)
BinaryMist

BinaryMist

language

Risk Assessment Services

BinaryMist on SecurityListing: A company that helps organizations create security-aware teams and produce bug-free software.

3.8(1)
Randomized Malleable C2 Profiles Made Easy

Randomized Malleable C2

language

Penetration Testing

Randomized Malleable C2 Profiles Made Easy on SecurityListing: Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

3.8(1)
SSLBL - SSL Blacklist

SSLBL - SSL

language

Threat Intelligence Platforms

SSLBL - SSL Blacklist on SecurityListing: A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.

Censys Internet Intelligence Platform

Censys Internet Intelligence

language

Threat Hunting

Censys Internet Intelligence Platform on SecurityListing: Internet intelligence platform for asset discovery and threat analysis

ThreatBook Threat Detection Platform (TDP)

ThreatBook Threat Detection

language

Threat Intelligence Platforms

ThreatBook Threat Detection Platform (TDP) on SecurityListing: Network detection and response platform with threat intel fusion and automation

Censys Threat Hunting

Censys Threat Hunting

language

Threat Hunting

Censys Threat Hunting on SecurityListing: Proactive threat hunting platform for detecting adversary infrastructure

WebDAV Covert Channel

WebDAV Covert Channel

language

Offensive Security

WebDAV Covert Channel on SecurityListing: A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.