C2
Browse 15 cybersecurity tools tagged with "C2"

Brute Ratel C4
Offensive Security
Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

HYAS Adversary Infrastructure
Threat Intelligence Platforms
HYAS Adversary Infrastructure Platform on SecurityListing: Platform for tracking adversary infrastructure and C2 communications

Cobalt Strike HTTP
Offensive Security
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

PoshC2
Penetration Testing
PoshC2 on SecurityListing: A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

Cobalt Strike's ExternalC2
Penetration Testing
Cobalt Strike's ExternalC2 framework on SecurityListing: A specification/framework for extending default C2 communication channels in Cobalt Strike

How to Write
Offensive Security
How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset

IronNet IronRadar
Threat Intelligence Platforms
IronNet IronRadar on SecurityListing: Proactive C2 threat intelligence feed for detecting adversary infrastructure

GHH - Google
Security Operations
GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

BinaryMist
Risk Assessment Services
BinaryMist on SecurityListing: A company that helps organizations create security-aware teams and produce bug-free software.

Randomized Malleable C2
Penetration Testing
Randomized Malleable C2 Profiles Made Easy on SecurityListing: Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

SSLBL - SSL
Threat Intelligence Platforms
SSLBL - SSL Blacklist on SecurityListing: A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.

Censys Internet Intelligence
Threat Hunting
Censys Internet Intelligence Platform on SecurityListing: Internet intelligence platform for asset discovery and threat analysis

ThreatBook Threat Detection
Threat Intelligence Platforms
ThreatBook Threat Detection Platform (TDP) on SecurityListing: Network detection and response platform with threat intel fusion and automation

Censys Threat Hunting
Threat Hunting
Censys Threat Hunting on SecurityListing: Proactive threat hunting platform for detecting adversary infrastructure

WebDAV Covert Channel
Offensive Security
WebDAV Covert Channel on SecurityListing: A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.