CyberLibrary
Search
⌃K
CyberLibrary
Search
⌃K
💻
WELCOME
CyberLibrary
About Wh1teDrvg0n
Getting started in CyberSec
📑
RESOURCES (in progress)
🔴
C2
🔴
Phishing
🔴
Hardware Hacking
🟣
Tools
🟣
Buffer Overflow
🟣
Malware
🟣
Windows
🟣
LOLBins
🟣
OSINT
🟣
Others
🔵
Threat Hunting
🔵
Threat Intelligence
🔵
Incident Response
🔵
Forensics
🪢
NETWORKING
Coming Soon
🖥
Systems
Coming Soon
🚘
Car Hacking
Introduction
Keys
Mobile/Bluetooth
USB
OBD II
CAN BUS
Ransomware
Powered By
GitBook
🔴
C2
C2, C&C, Command and Control or whatever you call them.
[Work in progress]
Viper:
https://github.com/FunnyWolf/Viper/blob/master/README_EN.md
Cobalt Strike:
https://www.cobaltstrike.com/
Empire:
https://github.com/BC-SECURITY/Empire
Brute Ratel C4 (BRC4):
https://bruteratel.com/
NightHawk:
https://www.mdsec.co.uk/nighthawk/
SharpC2:
https://github.com/SharpC2/SharpC2
Covenant:
https://github.com/cobbr/Covenant
INNUENDO:
https://www.immunityinc.com/products/innuendo/
And a lot more...
Here you can find a more completed list named "The C2 Matrix":
Made by:
https://www.thec2matrix.com/about
Implants
[Work in progress]
Tools
Shannon encoding to hide malicious CobalStrike shellcode:
https://github.com/kleiton0x00/Shelltropy
WELCOME - Previous
Getting started in CyberSec
Next - RESOURCES (in progress)
Phishing
Last modified
9mo ago