c2
Here are 18 public repositories matching this topic...
Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for security professionals and enthusiasts.
-
Updated
Mar 13, 2024 - C
LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis
-
Updated
Feb 18, 2025 - C
A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.
-
Updated
Mar 21, 2025 - C
EternalHush - new free advanced open-source c2 framework
-
Updated
Oct 28, 2023 - C
C2 extensible for post-explotation and remote control
-
Updated
Mar 4, 2024 - C
C2 : Command and Control Server for the Trojan Backdoor, acting as Remote access tool.
-
Updated
Sep 11, 2024 - C
an armarda of tools for stealthily infiltration and post exploitation
-
Updated
Oct 28, 2023 - C
custom c2 framework with beacons for both linux and windows
-
Updated
Jan 19, 2025 - C
the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.
-
Updated
Sep 8, 2024 - C
Another Mirai Varient from two years ago
-
Updated
Jan 16, 2025 - C
This is the C code for the Remote Access Trojan (RAT) client. It performs various functions such as encryption/decryption, sending/receiving ICMP packets, and anti-debugging measures.
-
Updated
Jul 11, 2024 - C
Dynamic encryption method ransomware
-
Updated
Jun 19, 2024 - C
Improve this page
Add a description, image, and links to the c2 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the c2 topic, visit your repo's landing page and select "manage topics."