C2
Browse 15 cybersecurity tools tagged with "C2"
HYAS Adversary Infrastructure
Threat Intelligence Platforms
HYAS Adversary Infrastructure Platform on SecurityListing: Platform for tracking adversary infrastructure and C2 communications
Cobalt Strike HTTP
Offensive Security
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.
Brute Ratel C4
Offensive Security
Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
PoshC2
Penetration Testing
PoshC2 on SecurityListing: A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.
Cobalt Strike's ExternalC2
Penetration Testing
Cobalt Strike's ExternalC2 framework on SecurityListing: A specification/framework for extending default C2 communication channels in Cobalt Strike
How to Write
Offensive Security
How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset
IronNet IronRadar
Threat Intelligence Platforms
IronNet IronRadar on SecurityListing: Proactive C2 threat intelligence feed for detecting adversary infrastructure
GHH - Google
Security Operations
GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
Randomized Malleable C2
Penetration Testing
Randomized Malleable C2 Profiles Made Easy on SecurityListing: Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.
BinaryMist
Risk Assessment Services
BinaryMist on SecurityListing: A company that helps organizations create security-aware teams and produce bug-free software.
Censys Internet Intelligence
Threat Hunting
Censys Internet Intelligence Platform on SecurityListing: Internet intelligence platform for asset discovery and threat analysis
SSLBL - SSL
Threat Intelligence Platforms
SSLBL - SSL Blacklist on SecurityListing: A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.
WebDAV Covert Channel
Offensive Security
WebDAV Covert Channel on SecurityListing: A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
Censys Threat Hunting
Threat Hunting
Censys Threat Hunting on SecurityListing: Proactive threat hunting platform for detecting adversary infrastructure
ThreatBook Threat Detection
Threat Intelligence Platforms
ThreatBook Threat Detection Platform (TDP) on SecurityListing: Network detection and response platform with threat intel fusion and automation