CyberLibrary
Search
⌃K
CyberLibrary
Search
⌃K
💻
WELCOME
CyberLibrary
About Wh1teDrvg0n
Getting started in CyberSec
📑
RESOURCES (in progress)
🔴
C2
🔴
Phishing
🔴
Hardware Hacking
🟣
Tools
🟣
Buffer Overflow
🟣
Malware
🟣
Windows
🟣
LOLBins
🟣
OSINT
🟣
Others
🔵
Threat Hunting
🔵
Threat Intelligence
🔵
Incident Response
🔵
Forensics
🪢
NETWORKING
Coming Soon
🖥
Systems
Coming Soon
🚘
Car Hacking
Introduction
Keys
Mobile/Bluetooth
USB
OBD II
CAN BUS
Ransomware
Powered By GitBook
🔴

C2

C2, C&C, Command and Control or whatever you call them.
[Work in progress]
  • Viper: https://github.com/FunnyWolf/Viper/blob/master/README_EN.md​
  • Cobalt Strike: https://www.cobaltstrike.com/​
  • Empire: https://github.com/BC-SECURITY/Empire​
  • Brute Ratel C4 (BRC4): https://bruteratel.com/​
  • NightHawk: https://www.mdsec.co.uk/nighthawk/​
  • SharpC2: https://github.com/SharpC2/SharpC2​
  • Covenant: https://github.com/cobbr/Covenant​
  • INNUENDO: https://www.immunityinc.com/products/innuendo/​
And a lot more...
Here you can find a more completed list named "The C2 Matrix":
Made by: https://www.thec2matrix.com/about​

Implants

[Work in progress]

Tools

  • Shannon encoding to hide malicious CobalStrike shellcode: https://github.com/kleiton0x00/Shelltropy
​
WELCOME - Previous
Getting started in CyberSec
Next - RESOURCES (in progress)
Phishing
Last modified 9mo ago
Copy link
On this page
Implants
Tools